Azure-Sentinel/Sample Data/CEF/Morphisec.csv

6.7 KiB

1TimeGenerated [UTC]DeviceVendorDeviceProductDeviceEventClassIDLogSeverityMessageSourceIPDeviceVersionActivityFileHashFileNameSourceHostNameSourceUserNameAdditionalExtensionsTypeStartAttackedModuleMorphisecVersionAttackNameAttackCategory
212/3/2020, 1:34:42.544 PMMorphisecEPTPMORPHISEC_ATTACK8Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821110.0.0.54.5.4Attack was detected and stopped by Morphisec52910ce2fdae6354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:/Users/Admin/AppData/Local/Microsoft/Windows/INetCache/Low/IE/9VVK36Y8/he-il[1].htmDESKTOP-9DDBB2LNT AUTHORITY/SYSTEMstart=Nov 02 2020 20:06:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.1.0;AttackName=ATOM BOMBING CODE;AttackCategory=FILELESS;Severity=8;Attackdescription=Atom Bombing is a code injection technique based on Windows identifiers that associate a string with a 16-bit integer. The Dridex malware family, among others, is known to use Atom Bombing. The Atoms can be accessed across processes when added to the global Atom table. Malware exploits this by placing shellcode as a global Atom, then accesses it via an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode.CommonSecurityLogNov 02 2020 20:06:56 UTCkernel32.dll4.5.4ATOM BOMBING CODEFILELESS
312/3/2020, 1:34:43.545 PMMorphisecEPTPMORPHISEC_ATTACK8Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821110.0.0.54.5.4Attack was detected and stopped by Morphisec52910ce2fdae6354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:/Users/Admin/AppData/Local/Microsoft/Windows/INetCache/Low/IE/9VVK36Y8/he-il[1].htmDESKTOP-9DDBB2LNT AUTHORITY/SYSTEMstart=Nov 02 2020 20:06:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.1.0;AttackName=ATOM BOMBING CODE;AttackCategory=FILELESS;Severity=8;Attackdescription=Atom Bombing is a code injection technique based on Windows identifiers that associate a string with a 16-bit integer. The Dridex malware family, among others, is known to use Atom Bombing. The Atoms can be accessed across processes when added to the global Atom table. Malware exploits this by placing shellcode as a global Atom, then accesses it via an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode.CommonSecurityLogNov 02 2020 20:06:56 UTCkernel32.dll4.5.4ATOM BOMBING CODEFILELESS
412/3/2020, 1:40:15.018 PMMorphisecEPTPMORPHISEC_ATTACK9Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821210.0.0.94.5.2Attack was detected and stopped by Morphisec391725186354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:\Users\Admin\Desktop\mimikatz\mimikatz.exeDESKTOP-9CC234LNT AUTHORITY/SYSTEMstart=Nov 03 2020 14:05:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.5.2;AttackName=HACKTOOL:WIN64/Mikatz;AttackCategory=TOOL;Severity=9 CommonSecurityLogNov 03 2020 14:05:56 UTCkernel32.dll4.5.2HACKTOOL:WIN64/MikatzTOOL
512/3/2020, 1:40:15.790 PMMorphisecEPTPMORPHISEC_ATTACK9Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821310.0.0.94.5.2Attack was detected and stopped by Morphisec391725186354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:\Users\Admin\Desktop\mimikatz\mimikatz.exeDESKTOP-9CC234LNT AUTHORITY/SYSTEMstart=Nov 03 2020 14:05:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.5.2;AttackName=HACKTOOL:WIN64/Mikatz;AttackCategory=TOOL;Severity=9 CommonSecurityLogNov 03 2020 14:05:56 UTCkernel32.dll4.5.2HACKTOOL:WIN64/MikatzTOOL
612/3/2020, 9:57:37.520 AMMorphisecEPTPMORPHISEC_ATTACK10Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821410.0.0.34.5.3Attack was detected and stopped by Morphisec52910ce2fdae6354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:/Users/Admin/AppData/Local/Microsoft/Windows/INetCache/Low/IE/9VVK36Y8/he-il[1].htmDESKTOP-98DBB2LNT AUTHORITY/SYSTEMstart=Nov 02 2020 20:06:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.1.0;AttackName=Easy Anti-Cheat Software Code Injection;AttackCategory=Hacking Tool;Severity=4;Attackdescription=The following Anti-Cheat software injects into the most critical Windows process.CommonSecurityLogNov 02 2020 20:06:56 UTCkernel32.dll4.5.3Easy Anti-Cheat Software Code InjectionHacking Tool
712/3/2020, 9:57:38.032 AMMorphisecEPTPMORPHISEC_ATTACK10Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821510.0.0.34.5.3Attack was detected and stopped by Morphisec52910ce2fdae6354b74397c2dc35c26bf323f60387bdb3f9891d52a59ca45d65C:/Users/Admin/AppData/Local/Microsoft/Windows/INetCache/Low/IE/9VVK36Y8/he-il[1].htmDESKTOP-98DBB2LNT AUTHORITY/SYSTEMstart=Nov 02 2020 20:06:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.1.0;AttackName=Easy Anti-Cheat Software Code Injection;AttackCategory=Hacking Tool;Severity=4;Attackdescription=The following Anti-Cheat software injects into the most critical Windows process.CommonSecurityLogNov 02 2020 20:06:56 UTCkernel32.dll4.5.3Easy Anti-Cheat Software Code InjectionHacking Tool
812/3/2020, 1:41:49.391 PMMorphisecEPTPMORPHISEC_ATTACK4Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821610.0.0.14.5.0Attack was detected and stopped by Morphisece582676ec900249b408ab4e37976ae8c443635a7da77755daf6f896a172856a3C:/Program Files (x86)/Internet Explorer/iexplore.exeDESKTOP-8VC234LNT AUTHORITY/SYSTEMstart=Nov 01 2020 15:35:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.5.0;AttackName=VB SCRIPT BLOCKING;AttackCategory=SUSPICIOUS ACTIVITY;Severity=4 CommonSecurityLogNov 01 2020 15:35:56 UTCkernel32.dll4.5.0VB SCRIPT BLOCKINGSUSPICIOUS ACTIVITY
912/3/2020, 1:41:50.064 PMMorphisecEPTPMORPHISEC_ATTACK4Morphisec attack was detected and stopped on application lsass, https://127.0.0.1/threats/morphisecThreat/a3870626-76eb-4dad-821710.0.0.14.5.0Attack was detected and stopped by Morphisece582676ec900249b408ab4e37976ae8c443635a7da77755daf6f896a172856a3C:/Program Files (x86)/Internet Explorer/iexplore.exeDESKTOP-8VC234LNT AUTHORITY/SYSTEMstart=Nov 01 2020 15:35:56 UTC;AttackedModule=kernel32.dll;MorphisecVersion=4.5.0;AttackName=VB SCRIPT BLOCKING;AttackCategory=SUSPICIOUS ACTIVITY;Severity=4 CommonSecurityLogNov 01 2020 15:35:56 UTCkernel32.dll4.5.0VB SCRIPT BLOCKINGSUSPICIOUS ACTIVITY