Approved

Device Activity (Multiple queries in one)

As a threat hunter it is critical to get oriented quickly.  When you have a device that has suspect activity on it and the threat hunter is still exploring what is happening they want a lot of different information about the device.  This information is everything from what OS is it to have common live off the land tools been being run and does the device and who is on the device right now.  With Live discover it is easy for the admin to run a query to get each of those bits of information but to speed things up I wanted to all of that and more in a single query.  The query below will use UNION ALL to create a list of useful information about the device. 

-- Cards orient the results in three columns 
--    ATRIBUTE - The thing being checked
--    VALUE - The result of the evaluation
--    CONTEXT - Some useful information related to the Attribute
--    CONTEXT_DATA - The inoformation for the context information being shown
--    NOTES - Some additional relevant information on the Attribute/Value 

-- COLLECT A LIST OF SUSPECT PUA AND SUSPECT MAL software seen running on the device in the last 7 days
WITH List_of_suspects AS ( SELECT * 
FROM Sophos_File_Properties 
WHERE sophos_File_properties.pathname IN (SELECT DISTINCT pathname FROM sophos_process_journal spj WHERE spj.time > strftime('%s','now','-7 days') GROUP BY sha256 )
ORDER BY puascore DESC, mlscore DESC LIMIT 5
)

-- BLANK LINE BETWEEN EACH DEVICE 
SELECT CAST('=========================' AS TEXT) ATTRIBUTE, CAST('=========================' AS TEXT) VALUE, CAST('=========================' AS TEXT) CONTEXT, CAST('=========================' AS TEXT) CONTEXT_DATA, CAST('=========================' AS TEXT) NOTES 

UNION ALL

-- Operating System information
SELECT 'OPERATING SYSTEM' ATTRIBUTE, name VALUE, 'VERSION' CONTEXT, version CONTEXT_DATA,  'INSTALLED ON: ' || substr(install_date,1,4) || ' ' || substr(install_date,5,2) || ' ' || substr(install_date,7,2) || ' ' || substr(install_date,9,2) || ':' || substr(install_date,11,2) NOTES
FROM os_version

UNION ALL

-- Current IP/MAC and DHCP Server for the device
SELECT 'IP-ADDRESS' ATTRIBUTE, CAST(ia.address AS TEXT) VALUE, 'MAC ADDRESS' CONTEXT, id.mac CONTEXT_DATA, 'DHCP SERVER: ' || id.dhcp_server NOTES
FROM interface_addresses ia JOIN interface_details id ON id.interface = ia.interface
WHERE ia.address NOT IN ('::1','127.0.0.1') AND id.enabled <> 0

-- UNION ALL

-- ISOLATED/HEALTH STATUS
-- SOME SQL CODE

UNION ALL

-- DISK INFO
-- TO DO - Add bitlocker enabled info for each drive
SELECT 'HARD DISK' ATTRIBUTE, device_id VALUE, 'SIZE ' CONTEXT, printf("%.2f", CAST(size AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, printf("%.2f", (CAST (free_space AS FLOAT)/CAST(size AS FLOAT) ) * 100.0  ) || '% Free' NOTES
FROM logical_drives WHERE size > 0

UNION ALL

-- CPU AND MEMORY INFO
SELECT 'CPU/MEMORY ' ATTRIBUTE, cpu_brand VALUE, 'MEMORY' CONTEXT,  printf("%.2f", CAST(physical_memory AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, 'VENDOR: ' || hardware_vendor || ' MODEL: ' || hardware_model NOTES
FROM system_info

UNION ALL

-- UP TIME
SELECT 'UP TIME' ATTRIBUTE, days || ' days, ' || hours || ' hours ' || minutes || ' minutes' VALUE, 'BOOT MODE' CONTEXT,
   ( 
     SELECT CASE JSON_EXTRACT(data, '$.EventData.BootMode') WHEN '0' THEN 'Normal_Boot' WHEN '1' THEN 'Safe-Mode' ELSE 'Unknown Mode: ' || JSON_EXTRACT(data, '$.EventData.BootMode') END AS 'Boot Mode'
     FROM sophos_windows_events WHERE (eventid = 12 AND task = 1) AND time > STRFTIME('%s','NOW','-90 DAYS') ORDER by 1 DESC LIMIT 1 
   ) CONTEXT_VALUE, '' NOTES
FROM uptime

UNION ALL

-- CURRENT USERS with active processes
SELECT 'PROCESS COUNT BY USER' ATTRIBUTE, u.username VALUE, 'ACTIVE PROCESS COUNT' CONTEXT, count(p.uid) CONTEXT_DATA, 'USER TYPE: ' || u.type || ' UID: ' || u.uid || ' GID: ' || u.gid NOTES
FROM users u JOIN processes p ON p.uid = u.uid GROUP BY p.uid

UNION ALL

-- RDP STATUS
SELECT DISTINCT 'CHECK IF RDP IS LISTENING' ATTRIBUTE, 'Listening for connection' VALUE, '' CONTEXT, '' CONTEXT_DATA, '' NOTES
FROM listening_ports lp 
WHERE lp.port = 3389

UNION ALL

-- SUSPECT PUA
-- TO DO: Add indicator if that process is currently running
SELECT 'SUSPECT PUA' ATTRIBUTE, pathname VALUE, 'PUA SCORE' CONTEXT, puascore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES
FROM List_of_suspects los 
WHERE puascore > 30 

UNION ALL

-- SUSPECT MAL 
-- TO DO: Add indicator if that process is currently running
SELECT 'SUSPECT MAL' ATTRIBUTE, pathname VALUE, 'MAL SCORE' CONTEXT, mlscore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES
FROM List_of_suspects los 
WHERE mlscore > 30 

UNION ALL

-- NEW Executables installed by the USERS in last 7 days
-- WARNING: PROCESSES CREATED BY THE USER 'SYSTEM' ARE EXCLUDED
SELECT 'NEW USER INSTALLED EXECUTABLE (last 7 days)' ATTRIBUTE, sfj.pathname VALUE, 'CREATING PROCESS NAME' CONTEXT, spj.processName CONTEXT_DATA, 
   'CREATED BY: ' || u.username || ' CREATED ON: ' || datetime(sfj.creationTime,'unixepoch') || ' CREATING PROCESS SPID: ' || sfj.sophosPID NOTES
FROM sophos_file_journal sfj 
   JOIN sophos_process_journal spj ON spj.sophosPID = sfj.sophosPID
   JOIN users u ON u.uuid = spj.sid
WHERE sfj.subject = 'FileBinaryChanges' AND sfj.time > strftime('%s','now','-7 days') AND sfj.eventType IN (0,1,3)
   AND u.username <> 'SYSTEM'
   AND sfj.pathname LIKE '%.exe'

UNION ALL

-- COMMON LOL TOOL USAGE
SELECT 'LIVE OFF LAND TOOL USE (Last 7 days)' ATTRIBUTE, spj.processname VALUE, 'RUN BY USER' CONTEXT, u.username CONTEXT_DATA,  'COMMAND LINE: ' || spj.cmdline || ' SOPHOS PID: ' || spj.sophosPID NOTES
FROM sophos_process_journal spj
   JOIN users u ON u.uuid = spj.sid
WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days') 
   AND spj.processname IN ('arp.exe', 'hostname.exe', 'ntdutil.exe', 'schtasks.exe', 'at.exe', 'ipconfig.exe', 'pathping.exe', 'systeminfo.exe', 'bitsadmin.exe', 'nbtstat.exe', 'ping.exe', 'tasklist.exe',
   'certutil.exe', 'net.exe', 'powershell.exe', 'tracert.exe', 'cmd.exe', 'net1.exe', 'qprocess.exe', 'ver.exe', 'dsget.exe', 'netdom.exe', 'query.exe', 'vssadmin.exe', 'dsquery.exe', 'netsh.exe', 'qwinsta.exe', 'wevtutil.exe',
   'find.exe', 'netstat.exe', 'reg.exe', 'whoami.exe', 'findstr.exe', 'nltest.exe', 'rundll32.exe', 'wmic.exe', 'fsutil.exe', 'nslookup.exe', 'sc.exe', 'wusa.exe'
   )
   AND u.username NOT IN('SYSTEM', 'LOCAL SERVICE', '')

UNION ALL 

-- ENCODED CMDLINES(last 7 days)
SELECT 'ENCOUDED COMMAND LINES (Last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'PROCESS NAME' CONTEXT, spj.processname CONTEXT_VALUE, 'SOPHOS PID: ' || spj.sophospid || ' USER: ' || u.username NOTES
FROM sophos_process_journal spj JOIN
   users u ON u.uuid = spj.sid
WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days') 
   AND spj.cmdline LIKE 'encode'
   AND u.username NOT IN ('SYSTEM', 'LOCAL SERVICE', '')

UNION ALL

-- SCHEDULED TASKS SETUP IN LAST 7 DAYS
SELECT 'NEW SCHEDULED TASKS (last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'CREATED BY USER' CONTEXT, u.username CONTEXT_DATA, 'DATE_TIME: ' || datetime(time, 'unixepoch') || ' SOPHOS PID: ' || spj.sophospid NOTES
FROM sophos_process_journal spj
   JOIN users u ON u.uuid = spj.sid
WHERE spj.time > strftime('%s','now', '-7 days') AND spj.eventtype = 0 AND
   spj.processname = 'schtasks.exe' AND spj.cmdline LIKE '%create%'

SAMPLE OUTPUT

epName
ATTRIBUTE
VALUE
CONTEXT
CONTEXT_DATA
NOTES
=========================
=========================
=========================
=========================
=========================
OPERATING SYSTEM
Microsoft Windows 7 Ultimate
VERSION
6.1.7601
INSTALLED ON: 2016 09 12 15:40
IP-ADDRESS
192.168.100.143
MAC ADDRESS
00:50:56:2a:3a:13
DHCP SERVER: 192.168.100.254
IP-ADDRESS
fe80::100:7f:fffe
MAC ADDRESS
00:00:00:00:00:00:00:e0
DHCP SERVER:
HARD DISK
C:
SIZE
60.00(GB)
61.33% Free
CPU/MEMORY
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
MEMORY
3.00(GB)
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
UP TIME
3 days, 13 hours 18 minutes
BOOT MODE
PROCESS COUNT BY USER
SYSTEM
ACTIVE PROCESS COUNT
39
USER TYPE: special UID: 18 GID: 18
PROCESS COUNT BY USER
LOCAL SERVICE
ACTIVE PROCESS COUNT
15
USER TYPE: special UID: 19 GID: 19
PROCESS COUNT BY USER
NETWORK SERVICE
ACTIVE PROCESS COUNT
5
USER TYPE: special UID: 20 GID: 20
SUSPECT PUA
C:\Windows\System32\dllhost.exe
PUA SCORE
41
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
SUSPECT PUA
C:\Program Files\Windows Media Player\wmpnetwk.exe
PUA SCORE
38
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
SUSPECT PUA
C:\Windows\System32\autochk.exe
PUA SCORE
38
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
SUSPECT PUA
C:\Windows\System32\csrss.exe
PUA SCORE
38
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
SUSPECT PUA
C:\Windows\System32\conhost.exe
PUA SCORE
37
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 1484:132482013107543154
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5572:132482013534837594
=========================
=========================
=========================
=========================
=========================
OPERATING SYSTEM
Microsoft Windows 7 Ultimate
VERSION
6.1.7601
INSTALLED ON: 2016 09 12 15:40
IP-ADDRESS
192.168.100.183
MAC ADDRESS
00:50:56:25:94:3c
DHCP SERVER: 192.168.100.254
IP-ADDRESS
fe80::100:7f:fffe
MAC ADDRESS
00:00:00:00:00:00:00:e0
DHCP SERVER:
HARD DISK
C:
SIZE
60.00(GB)
60.67% Free
CPU/MEMORY
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
MEMORY
3.00(GB)
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
UP TIME
3 days, 13 hours 18 minutes
BOOT MODE
PROCESS COUNT BY USER
SYSTEM
ACTIVE PROCESS COUNT
38
USER TYPE: special UID: 18 GID: 18
PROCESS COUNT BY USER
LOCAL SERVICE
ACTIVE PROCESS COUNT
15
USER TYPE: special UID: 19 GID: 19
PROCESS COUNT BY USER
NETWORK SERVICE
ACTIVE PROCESS COUNT
6
USER TYPE: special UID: 20 GID: 20
PROCESS COUNT BY USER
test
ACTIVE PROCESS COUNT
10
USER TYPE: local UID: 1002 GID: 513
SUSPECT PUA
C:\Windows\System32\dllhost.exe
PUA SCORE
41
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
SUSPECT PUA
C:\Program Files\Windows Media Player\wmpnetwk.exe
PUA SCORE
38
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
SUSPECT PUA
C:\Windows\System32\autochk.exe
PUA SCORE
38
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
SUSPECT PUA
C:\Windows\System32\csrss.exe
PUA SCORE
38
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
SUSPECT PUA
C:\Windows\System32\conhost.exe
PUA SCORE
37
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\PerfLogs\SophosSetup.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
CREATING PROCESS NAME
SophosSetup.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
CREATING PROCESS NAME
Setup.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\PerfLogs\SophosSetup.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
CREATING PROCESS NAME
SophosSetup.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
CREATING PROCESS NAME
Setup.exe
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5276:132482013226331772
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt yr1WC98xYUeiFhBC.1 Census SOPHOS PID: 4360:132482840457734512
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt OUqtUY43BU2WrqCJ.1 Census SOPHOS PID: 6040:132485858646823219
LIVE OFF LAND TOOL USE (Last 7 days)
rundll32.exe
RUN BY USER
test
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt iW71dRP6jEWqAl8a.1 Census SOPHOS PID: 6776:132486737379512842
=========================
=========================
=========================
=========================
=========================
OPERATING SYSTEM
Microsoft Windows 10 Pro
VERSION
10.0.19041
INSTALLED ON: 2020 06 10 10:25
IP-ADDRESS
fe80::3837:20c:2ac5:235
MAC ADDRESS
6e:ea:1d:c1:aa:55
DHCP SERVER:
IP-ADDRESS
169.254.2.53
MAC ADDRESS
6e:ea:1d:c1:aa:55
DHCP SERVER:
IP-ADDRESS
fe80::3046:a74:92c1:4245
MAC ADDRESS
00:50:56:c0:00:0a
DHCP SERVER:
IP-ADDRESS
172.16.16.1
MAC ADDRESS
00:50:56:c0:00:0a
DHCP SERVER:
IP-ADDRESS
fe80::cff:dcd7:bb9e:34ed
MAC ADDRESS
00:50:56:c0:00:08
DHCP SERVER:
IP-ADDRESS
192.168.100.1
MAC ADDRESS
00:50:56:c0:00:08
DHCP SERVER:
IP-ADDRESS
fe80::f101:efed:1c0:a21e
MAC ADDRESS
00:50:56:c0:00:10
DHCP SERVER:
IP-ADDRESS
10.50.50.1
MAC ADDRESS
00:50:56:c0:00:10
DHCP SERVER:
IP-ADDRESS
fe80::fc6e:5922:21d5:be56
MAC ADDRESS
5c:ea:1d:c1:aa:55
DHCP SERVER: 192.168.1.1
IP-ADDRESS
192.168.1.173
MAC ADDRESS
5c:ea:1d:c1:aa:55
DHCP SERVER: 192.168.1.1
HARD DISK
C:
SIZE
952.14(GB)
10.61% Free
CPU/MEMORY
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
MEMORY
63.83(GB)
VENDOR: Dell Inc. MODEL: Precision 7720
UP TIME
4 days, 9 hours 28 minutes
BOOT MODE
PROCESS COUNT BY USER
SYSTEM
ACTIVE PROCESS COUNT
121
USER TYPE: special UID: 18 GID: 18
PROCESS COUNT BY USER
LOCAL SERVICE
ACTIVE PROCESS COUNT
44
USER TYPE: special UID: 19 GID: 19
PROCESS COUNT BY USER
NETWORK SERVICE
ACTIVE PROCESS COUNT
10
USER TYPE: special UID: 20 GID: 20
PROCESS COUNT BY USER
Admin
ACTIVE PROCESS COUNT
92
USER TYPE: local UID: 1001 GID: 513
SUSPECT PUA
C:\Windows\System32\services.exe
PUA SCORE
37
SHA256: 2400ad6ba8b57ee28972db12e39f5546ceff1854ee1013c22ac756ed64dc353d
SUSPECT PUA
C:\Windows\System32\sc.exe
PUA SCORE
35
SHA256: 41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9
SUSPECT PUA
C:\Windows\System32\dxgiadaptercache.exe
PUA SCORE
32
SHA256: 7ee345476d996e05e7d7519e0639abbc6d23011b5c38bfdcc63ad89d1352270a
SUSPECT PUA
C:\Windows\System32\MusNotification.exe
PUA SCORE
32
SHA256: 819fc501339911469bd79bc485101d18dd5cedc2de6f9e3fb112fcd68bf382fb
SUSPECT PUA
C:\Windows\System32\wevtutil.exe
PUA SCORE
31
SHA256: 4a727688b939e08c26064ea08dcff29b3d4608d28820874030524f79b4b1cca8
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
CREATING PROCESS NAME
devenv.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
CREATING PROCESS NAME
devenv.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
CREATING PROCESS NAME
vs_setup_bootstrapper.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:42 CREATING PROCESS SPID: 832:132481830398886053
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\DEBRAIN.EXE
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
CREATING PROCESS NAME
OneDriveStandaloneUpdater.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
CREATING PROCESS NAME
dllhost.exe
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
CREATING PROCESS NAME
vmware-vmx.exe
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
CREATING PROCESS NAME
devenv.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\DEBRAIN.EXE
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 1989-11-29 01:10:36 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\PerfLogs\sample IOC hunting query for Carbanak and Fin7.exe
CREATING PROCESS NAME
dllhost.exe
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\PerfLogs\TEST_CONFIRM WILDCARD MATCH.exe
CREATING PROCESS NAME
dllhost.exe
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\RansomGen.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\PerfLogs\RansomGen.exe
CREATING PROCESS NAME
dllhost.exe
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 16184:132485058970101352
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
CREATING PROCESS NAME
devenv.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
CREATING PROCESS NAME
devenv.exe
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
CREATING PROCESS NAME
vs_setup_bootstrapper.exe
CREATED BY: Admin CREATED ON: 2020-08-27 02:56:24 CREATING PROCESS SPID: 832:132481830398886053
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\DEBRAIN.EXE
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
CREATING PROCESS NAME
explorer.exe
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
CREATING PROCESS NAME
OneDriveStandaloneUpdater.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
CREATING PROCESS NAME
OneDriveSetup.exe
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
CREATING PROCESS NAME
dllhost.exe
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
CREATING PROCESS NAME
vmware-vmx.exe
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
NEW USER INSTALLED EXECUTABLE (last 7 days)
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
CREATING PROCESS NAME
cleanmgr.exe
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502