Back to list

Incident Overview

Incident ID CINC-20251221-1A1A5CD5
Severity Medium (70)
Status new
Alert Count 28
Host Count 1

Timeline

First Seen 2025-12-21 10:45:27
Last Seen 2025-12-22 07:53:05
Duration 0d 21h 7m
Created 2025-12-21 16:48
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Machine Learning
Techniques:
Sensor-based ML

Affected Hosts (1)

TEAHEE

Related Alerts (28)

Severity Status Hostname Description Tactic Command Line Time
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 07:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 06:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 05:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 04:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 03:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 02:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 01:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:53
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:29
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:25
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:25
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:21
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:21
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:17
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:17
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:13
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:13
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:09
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:09
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:05
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:05
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:01
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-22 00:01
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-21 23:58
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-21 23:58
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-21 23:52
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-21 10:45
High new TEAHEE A file written to the file system meets the on-sensor machine learning high confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware. Machine Learning "C:\Program Files\dotnet\dotnet.exe" exec "C:\Program Files\dotnet\sdk\9.0.308\Roslyn\bincore\VBCSCompiler.dll" "-pipename:hsGAWB1q1ludz2hJg8FYozpyFp31jIlpuPqYFxKDgEU" 12-21 10:45