Alert Loaded
Loading Navigation
Part of incident: Multiple threat families detected on one endpoint View incident page
desktop-finley
desktop-finley
Risk level
High
Severity: High
Windows10
DESKTOP-FINLEY\Administrator
DESKTOP-FINLEY\Administrator
Alert story
Alert story
Process tree
Alert timeline
Process tree
Copy to clipboard
8/19/2024
3:09:58 PM
[7232]
[7232]
userinit.exe
userinit.exe
3:09:58 PM
[9572]
[9572]
explorer.exe
explorer.exe
Remote execution
9/10/2024
10:50:33 AM
[11448]
[11448]
powershell.exe
powershell.exe
Remote execution
10:51:28 AM
powershell.exe executed a script
powershell.exe executed a script
Remote execution
10:51:56 AM
powershell.exe executed a script
powershell.exe executed a script
Remote execution
10:52:16 AM
powershell.exe interacted with file
powershell.exe interacted with file
SharpHound.exe
SharpHound.exe
Malware
Remote execution
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
Bloodhound post-exploitation tool
Bloodhound post-exploitation tool
New
Alert status: New
New
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
10:52:16 AM
powershell.exe interacted with file
powershell.exe interacted with file
SharpHound.exe
SharpHound.exe
Malware
Remote execution
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
Bloodhound post-exploitation tool
Bloodhound post-exploitation tool
New
Alert status: New
New
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
10:52:17 AM
powershell.exe interacted with file
powershell.exe interacted with file
SharpHound.ps1
SharpHound.ps1
Malware
Remote execution
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
'Leonem' malware was detected
'Leonem' malware was detected
Resolved
Alert status: Resolved
Resolved
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
10:52:17 AM
powershell.exe interacted with file
powershell.exe interacted with file
SharpHound.ps1
SharpHound.ps1
Malware
Remote execution
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
'Leonem' malware was detected
'Leonem' malware was detected
Resolved
Alert status: Resolved
Resolved
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
Additional related files
Additional related files
9/10/2024
10:52:16 AM
SharpHound.exe
SharpHound.exe
Malware
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
Bloodhound post-exploitation tool
Bloodhound post-exploitation tool
New
Alert status: New
New
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
10:52:16 AM
SharpHound.exe
SharpHound.exe
Malware
SHA1
Path
Size
Signer
VirusTotal detection ratio
Remediation details
Bloodhound post-exploitation tool
Bloodhound post-exploitation tool
New
Alert status: New
New
Detected
Detection status: Detected
Detected
Informational
Severity: Informational
Bloodhound post-exploitation tool
Informational
Severity: Informational
Detected
Detection status: Detected
New
Alert status: New
Details
Recommendations
Details
INSIGHT
INSIGHT
Classification
Assigned to
API-Automated Investigation and Response
Category
Suspicious activity
MITRE ATT&CK Techniques
Detection source
Antivirus
Service source
Microsoft Defender for Endpoint
Detection status
Detected
Detection technology
Client
Generated on
Sep 10, 2024 10:53 AM
First activity
Sep 10, 2024 10:52 AM
Last activity
Sep 10, 2024 10:53 AM
Incident
Incident severity
Active alerts1/2
Devices1
Users0
Mailboxes0
Apps0
Linked by
Investigation ID
Investigation status
Start time
End time
Duration
13:51m
emily.eaton@thisisarealcompany.com
Status changed from 'Resolved' to 'New'.
Sep 27, 2024 8:18:40 PM
API-Automated Investigation and Response
Status changed from 'New' to 'Resolved'.
Sep 10, 2024 11:07:05 AM
Automation
Alert linked to incident #189
Sep 10, 2024 10:54:50 AM
Automation
Alert linked to incident #190
Sep 10, 2024 10:53:12 AM