event
stringlengths
1.56k
2.97k
class
stringclasses
2 values
__index_level_0__
int64
0
49
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4cd"}, "preview": false, "result": {"_time": "2024-03-28T14:43:52.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:ad46dd83b9f149d5b374a005aaaba73a:545353867139801583", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/ad46dd83b9f149d5b374a005aaaba73a/545353867139801583?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.165", "MACAddress": "00-50-56-b4-b1-7b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545353797212365158", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545353797488140649", "ProcessStartTime": "1711651355", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "ad46dd83b9f149d5b374a005aaaba73a", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
0
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4cb"}, "preview": false, "result": {"_time": "2024-03-28T14:39:09.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:145d70cd66a44092a18eb8eef215dc3b:545353284630130644", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/145d70cd66a44092a18eb8eef215dc3b/545353284630130644?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,9f55bc60b96b4323a07e80fd71ea2317,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.1.136", "MACAddress": "00-50-56-b4-8c-0e", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545353199277092661", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545353199491002168", "ProcessStartTime": "1711651069", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "145d70cd66a44092a18eb8eef215dc3b", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
1
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e1"}, "preview": false, "result": {"_time": "2024-03-28T13:33:57.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:9f2bd314f6354bdeb4759784404ce767:545345054352845965", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/9f2bd314f6354bdeb4759784404ce767/545345054352845965?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.255", "MACAddress": "00-50-56-b4-4c-4b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344993863642106", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344994137320445", "ProcessStartTime": "1711647157", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "9f2bd314f6354bdeb4759784404ce767", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
2
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e5"}, "preview": false, "result": {"_time": "2024-03-28T11:52:25.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:dee907eea25f4b7095e5e68251ecb5cd:545332390263762690", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/dee907eea25f4b7095e5e68251ecb5cd/545332390263762690?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.253", "MACAddress": "00-50-56-b4-ae-ae", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545332328606445199", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545332328768974482", "ProcessStartTime": "1711641117", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "dee907eea25f4b7095e5e68251ecb5cd", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
3
{"_id": {"$oid": "6619a0f4ee51b4875ff0a500"}, "preview": false, "result": {"_time": "2024-03-28T07:13:02.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:fe7a5b46205f4fb4bdf953d7428dd2fc:545297069746198216", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/fe7a5b46205f4fb4bdf953d7428dd2fc/545297069746198216?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.159", "MACAddress": "00-50-56-b4-47-6b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545297000711099965", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545297000932349504", "ProcessStartTime": "1711624272", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "fe7a5b46205f4fb4bdf953d7428dd2fc", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
4
{"_id": {"$oid": "6619a0f4ee51b4875ff0a503"}, "preview": false, "result": {"_time": "2024-03-28T05:28:10.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:34a01e25e48c450a82f980e47e22985d:545283950122362877", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/34a01e25e48c450a82f980e47e22985d/545283950122362877?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.66", "MACAddress": "00-50-56-b4-14-c8", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545283863776323342", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545283864080410385", "ProcessStartTime": "1711618008", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "34a01e25e48c450a82f980e47e22985d", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
5
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d2"}, "preview": false, "result": {"_time": "2024-03-28T14:50:08.000-04:00", "ActivityId": "6CB2737F-2D75-4E8C-AC47-E96A22E6A0F8", "ContextTimeStamp": "133561253410000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:56DC8F0B-96B5-4C32-9AD5-0EEA933CAD9F", "DetectName": "Unusual login to an endpoint", "EndTime": "133561251000000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:56DC8F0B-96B5-4C32-9AD5-0EEA933CAD9F?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E19055", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-834206", "SourceAccountUpn": "E19055@hq.acme.com", "SourceEndpointAccountObjectGuid": "A33438B7-59E6-4F9C-8F9C-F8D37F4BBE14", "SourceEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-966984", "SourceEndpointHostName": "5cg3124x4y.hq.acme.com", "SourceEndpointIpAddress": "10.152.21.42", "SourceEndpointSensorId": "9f7f361fedb849d9a7f91bdacfbd0bd8", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561251000000000", "Tactic": "Initial Access", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
6
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d7"}, "preview": false, "result": {"_time": "2024-03-28T13:29:29.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:ae06257aaa6d43238d738b3b3e7a58d0:545344494065147232", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/ae06257aaa6d43238d738b3b3e7a58d0/545344494065147232?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.128", "MACAddress": "00-50-56-b4-d0-db", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344432048168087", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344432285146266", "ProcessStartTime": "1711646889", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "ae06257aaa6d43238d738b3b3e7a58d0", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
7
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4db"}, "preview": false, "result": {"_time": "2024-03-28T14:33:45.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:6f18ae3ee2d54baabac677d17bccd4f1:545352673162137546", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/6f18ae3ee2d54baabac677d17bccd4f1/545352673162137546?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.96", "MACAddress": "00-50-56-b4-db-d0", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545352515724742445", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545352516035120944", "ProcessStartTime": "1711650743", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "6f18ae3ee2d54baabac677d17bccd4f1", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
8
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4dd"}, "preview": false, "result": {"_time": "2024-03-28T14:38:53.000-04:00", "ContextTimeStamp": "133561246448580000", "DataDomains": "Identity", "DetectDescription": "A user didn't respond to a policy identity verification request", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:0ABF66FB-9BAE-44E3-B0CC-5E7AA40DA146", "DetectName": "Identity verification timed out", "EndTime": "133561246448580000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:0ABF66FB-9BAE-44E3-B0CC-5E7AA40DA146?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "IdpPolicyRuleName": "acme - MFA RDP (Non Programmatic)", "PatternId": "51142", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E17264", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-693905", "SourceAccountUpn": "E17264@hq.acme.com", "SourceEndpointAccountObjectGuid": "3E011ADA-C275-479F-806A-F8F31BE289AA", "SourceEndpointHostName": "5CG941937Z", "SourceEndpointIpAddress": "10.53.127.13", "SourceEndpointSensorId": "0daf97aebca84b67987d35cd2a8f98f0", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561246448580000", "TargetEndpointAccountObjectGuid": "5B9C3E0F-96F0-443E-AD40-2B99494A024B", "TargetEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-657770", "TargetEndpointHostName": "mxl9352s0c.hq.acme.com", "TargetEndpointSensorId": "2af73a76d8a84b227e031ff862c8d9bd", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
9
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f4"}, "preview": false, "result": {"_time": "2024-03-28T08:20:01.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:8b4e522c51874366ae987d3972132cd8:545305661284860606", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/8b4e522c51874366ae987d3972132cd8/545305661284860606?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.49", "MACAddress": "00-50-56-b4-03-94", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305591751688729", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305591987618332", "ProcessStartTime": "1711628368", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "8b4e522c51874366ae987d3972132cd8", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
10
{"_id": {"$oid": "6619a0f4ee51b4875ff0a502"}, "preview": false, "result": {"_time": "2024-03-28T05:29:19.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:8c2b9424fdd44016955083b89dab7887:545284171036361045", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/8c2b9424fdd44016955083b89dab7887/545284171036361045?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.94", "MACAddress": "00-50-56-b4-93-e1", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545284081472241864", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545284081702928587", "ProcessStartTime": "1711618111", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "8c2b9424fdd44016955083b89dab7887", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
11
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d0"}, "preview": false, "result": {"_time": "2024-03-28T13:35:41.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:68e33576c03b47ae97f51b0fb12c2332:545345386984344214", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/68e33576c03b47ae97f51b0fb12c2332/545345386984344214?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.18.248", "MACAddress": "00-50-56-b4-69-54", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344731198122143", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344731410983074", "ProcessStartTime": "1711647031", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "68e33576c03b47ae97f51b0fb12c2332", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
12
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d4"}, "preview": false, "result": {"_time": "2024-03-28T13:30:25.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:a5bdaa4b89cb43e58f02dbc289d20138:545344619149121691", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/a5bdaa4b89cb43e58f02dbc289d20138/545344619149121691?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.117", "MACAddress": "00-50-56-b4-ce-66", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344548997289906", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344549279356853", "ProcessStartTime": "1711646945", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "a5bdaa4b89cb43e58f02dbc289d20138", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
13
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4df"}, "preview": false, "result": {"_time": "2024-03-28T14:53:39.000-04:00", "ActivityId": "EEC2FB41-9E61-4696-A5AC-D460201040F2", "ContextTimeStamp": "133561255550000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:A51EA8D8-9392-48C0-9F11-3CB441F75482", "DetectName": "Unusual login to an endpoint", "EndTime": "133561252800000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:A51EA8D8-9392-48C0-9F11-3CB441F75482?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "12", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "PAM-IAM-016", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-730682", "SourceAccountUpn": "PAM-IAM-016@hq.acme.com", "SourceEndpointAccountObjectGuid": "CC2E7E12-6843-444A-8BE3-054AB8709FE6", "SourceEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-957748", "SourceEndpointHostName": "pz1-wsvacol-05.hq.acme.com", "SourceEndpointIpAddress": "10.45.170.104", "SourceEndpointSensorId": "73a2d13832b146019fa0824e1bcf8357", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561252800000000", "Tactic": "Initial Access", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
14
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4ce"}, "preview": false, "result": {"_time": "2024-03-28T14:36:47.000-04:00", "ActivityId": "AB45AFE3-DBF4-4816-A96B-CBD70D8F6554", "ContextTimeStamp": "133561245410000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:F790999C-1D46-4797-AE11-C241204DEEF9", "DetectName": "Unusual login to an endpoint", "EndTime": "133561243800000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:F790999C-1D46-4797-AE11-C241204DEEF9?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E11167", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-183443", "SourceAccountUpn": "E11167@hq.acme.com", "SourceEndpointAccountObjectGuid": "4851E891-6915-464C-9ACB-38DCBF4B23BB", "SourceEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-714694", "SourceEndpointHostName": "8cg91390rh.hq.acme.com", "SourceEndpointIpAddress": "10.151.11.27", "SourceEndpointSensorId": "55ee1c43ec7742467afe7175fd57b278", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561243800000000", "Tactic": "Initial Access", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
15
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f0"}, "preview": false, "result": {"_time": "2024-03-28T09:26:41.000-04:00", "ActivityId": "8A520A84-90BF-4D2B-B55C-F1C9D86E0D05", "ContextTimeStamp": "133561059360000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:A6EE19ED-217A-4287-8498-768DD94F2375", "DetectName": "Unusual login to an endpoint", "EndTime": "133561056600000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:A6EE19ED-217A-4287-8498-768DD94F2375?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "12", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E10555", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-176353", "SourceAccountUpn": "E10555@hq.acme.com", "SourceEndpointAccountObjectGuid": "66EB52E8-79E8-4907-B89E-1EDB07BDF4C9", "SourceEndpointAccountObjectSid": "S-1-5-21-821849187-1497174433-10498456-159831", "SourceEndpointHostName": "sdasnow01.nt.lab.com", "SourceEndpointIpAddress": "10.42.224.242", "SourceEndpointSensorId": "3865be37340c410692f56da9bfce0e6d", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561056600000000", "Tactic": "Initial Access", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
16
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4ed"}, "preview": false, "result": {"_time": "2024-03-28T09:39:00.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:f118f021dc1e4ab9838b69ab6d5edb49:545315515452066552", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/f118f021dc1e4ab9838b69ab6d5edb49/545315515452066552?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.5.30", "MACAddress": "00-50-56-b4-b3-7e", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545315424907528793", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545315425183304284", "ProcessStartTime": "1711633057", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "f118f021dc1e4ab9838b69ab6d5edb49", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
17
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f3"}, "preview": false, "result": {"_time": "2024-03-28T08:20:18.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:4b0373666ee944d39f6ca34a98038509:545305654375063232", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/4b0373666ee944d39f6ca34a98038509/545305654375063232?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.48", "MACAddress": "00-50-56-b4-35-f1", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305529409969689", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305529617587740", "ProcessStartTime": "1711628339", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "4b0373666ee944d39f6ca34a98038509", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
18
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d8"}, "preview": false, "result": {"_time": "2024-03-28T14:50:30.000-04:00", "ActivityId": "D3DD9F3A-39CC-4C01-B2DC-03CFEA146A8C", "ContextTimeStamp": "133561253620000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:86E37214-CCB6-42B4-93B9-D5E527195E50", "DetectName": "Unusual login to an endpoint", "EndTime": "133561252200000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:86E37214-CCB6-42B4-93B9-D5E527195E50?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "Autosys-user", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-168691", "SourceAccountUpn": "Autosys-user@hq.acme.com", "SourceEndpointAccountObjectGuid": "4EF2A84C-6F78-4324-A3CA-0F9391832C44", "SourceEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-964410", "SourceEndpointHostName": "pdauto02.hq.acme.com", "SourceEndpointIpAddress": "10.42.225.162", "SourceEndpointSensorId": "0b20d4cd2ea04e3c8a881f842434e6a1", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561252200000000", "Tactic": "Initial Access", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
19
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4de"}, "preview": false, "result": {"_time": "2024-03-28T14:39:37.000-04:00", "ActivityId": "7B28C8A8-BD85-4C08-AC93-C9AD16CE2F8E", "ContextTimeStamp": "133561247120000000", "DataDomains": "Identity", "DetectDescription": "A user executed a suspicious LDAP search enumerating Active Directory Certificate Services configurations", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:6D518E15-61CD-4997-9070-E52E0498B056", "DetectName": "Suspicious LDAP search (AD-CS reconnaissance)", "EndTime": "133561243800000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:6D518E15-61CD-4997-9070-E52E0498B056?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "LdapSearchQueryAttack": "20", "Objective": "Explore", "PatternId": "51159", "Severity": "7", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E11167", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-183443", "SourceAccountUpn": "E11167@hq.acme.com", "SourceEndpointAccountObjectGuid": "4851E891-6915-464C-9ACB-38DCBF4B23BB", "SourceEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-714694", "SourceEndpointHostName": "8cg91390rh.hq.acme.com", "SourceEndpointIpAddress": "10.151.11.27", "SourceEndpointSensorId": "55ee1c43ec7742467afe7175fd57b278", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561243800000000", "Tactic": "Discovery", "TargetAccountName": "PCNDC31$", "TargetEndpointAccountObjectGuid": "1225DBCE-A5C7-4B79-A4BA-FC2B5EB78B97", "TargetEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-961186", "TargetEndpointHostName": "pcndc31.hq.acme.com", "TargetEndpointSensorId": "c0f2b87c1f6148caaa9c8e02f161c7e2", "Technique": "Network Service Discovery", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
20
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4ea"}, "preview": false, "result": {"_time": "2024-03-28T09:47:43.000-04:00", "ActivityId": "7F1FFACA-CBD5-4A3E-8892-7CD46EDC76CD", "ContextTimeStamp": "133561071990000000", "DataDomains": "Identity", "DetectDescription": "A user logged in to a machine for the first time", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:94A1564E-6F78-435E-A65C-FC31369FEABA", "DetectName": "Unusual login to an endpoint", "EndTime": "133561070400000000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:94A1564E-6F78-435E-A65C-FC31369FEABA?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "Objective": "Gain Access", "PatternId": "51135", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "PAM-PRINT-02", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-774692", "SourceAccountUpn": "PAM-PRINT-02@hq.acme.com", "SourceEndpointAccountObjectGuid": "C8F7DA16-78F2-47E2-A3FA-2AA2EA401B3C", "SourceEndpointAccountObjectSid": "S-1-5-21-821849187-1497174433-10498456-160757", "SourceEndpointHostName": "dcansprnt03.nt.lab.com", "SourceEndpointIpAddress": "172.30.69.242", "SourceEndpointSensorId": "c99a5d0798664f4cbaf3ce9885090a43", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561070400000000", "Tactic": "Initial Access", "TargetAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-502", "TargetServiceAccessIdentifier": "krbtgt/HQ.acme.COM", "Technique": "Valid Accounts", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
21
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4fb"}, "preview": false, "result": {"_time": "2024-03-28T07:29:44.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:6009ec2d205b4fc3947e19b38be67369:545299244315341095", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/6009ec2d205b4fc3947e19b38be67369/545299244315341095?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.166", "MACAddress": "00-50-56-b4-0f-8c", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545299174176092278", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545299174421459065", "ProcessStartTime": "1711625308", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "6009ec2d205b4fc3947e19b38be67369", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
22
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4fc"}, "preview": false, "result": {"_time": "2024-03-28T07:29:15.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:db4628ff299e4354bef85ae9a9c9a48a:545299171045290195", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/db4628ff299e4354bef85ae9a9c9a48a/545299171045290195?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.67", "MACAddress": "00-50-56-b4-01-8b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545299107461738192", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545299107733319379", "ProcessStartTime": "1711625276", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "db4628ff299e4354bef85ae9a9c9a48a", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
23
{"_id": {"$oid": "6619a0f4ee51b4875ff0a505"}, "preview": false, "result": {"_time": "2024-03-28T05:06:14.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:7ce42fab4c9241bab533fd64057e7458:545281180556217992", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/7ce42fab4c9241bab533fd64057e7458/545281180556217992?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "9f55bc60b96b4323a07e80fd71ea2317,b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.54", "MACAddress": "00-50-56-b4-25-df", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545281111366979057", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545281111588228596", "ProcessStartTime": "1711616695", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "7ce42fab4c9241bab533fd64057e7458", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
24
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d9"}, "preview": false, "result": {"_time": "2024-03-28T14:34:53.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:dce73e92396845f49d7a6834291a772a:545352748396970898", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/dce73e92396845f49d7a6834291a772a/545352748396970898?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.25", "MACAddress": "00-50-56-b4-1b-61", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545352653584728807", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545352653864698602", "ProcessStartTime": "1711650809", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "dce73e92396845f49d7a6834291a772a", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
25
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d6"}, "preview": false, "result": {"_time": "2024-03-28T13:29:41.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:1890f5ac6f6b495e9346040a9c29f15a:545344569054328410", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/1890f5ac6f6b495e9346040a9c29f15a/545344569054328410?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.2.140", "MACAddress": "00-50-56-b4-f3-ab", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344460959774083", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344461166343558", "ProcessStartTime": "1711646903", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "1890f5ac6f6b495e9346040a9c29f15a", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
26
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e3"}, "preview": false, "result": {"_time": "2024-03-28T12:01:48.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:2062eda533e84c86ba8d3cf830e72296:545333516677677833", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/2062eda533e84c86ba8d3cf830e72296/545333516677677833?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "9f55bc60b96b4323a07e80fd71ea2317,b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.40", "MACAddress": "00-50-56-b4-8a-04", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545333411897672230", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545333412095853097", "ProcessStartTime": "1711641634", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "2062eda533e84c86ba8d3cf830e72296", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
27
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e4"}, "preview": false, "result": {"_time": "2024-03-28T11:57:33.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:8a446b40d442402dba7d81a03e97deca:545332939487841805", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/8a446b40d442402dba7d81a03e97deca/545332939487841805?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.5.57", "MACAddress": "00-50-56-b4-79-76", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545332862108175656", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545332862403874091", "ProcessStartTime": "1711641372", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "8a446b40d442402dba7d81a03e97deca", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
28
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f7"}, "preview": false, "result": {"_time": "2024-03-28T08:18:07.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:fbca6faff66c4765a454dc36cccf19bf:545305421990744372", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/fbca6faff66c4765a454dc36cccf19bf/545305421990744372?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.145", "MACAddress": "00-50-56-b4-74-b9", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305336539140207", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305336915578994", "ProcessStartTime": "1711628247", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "fbca6faff66c4765a454dc36cccf19bf", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
29
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f8"}, "preview": false, "result": {"_time": "2024-03-28T08:17:55.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:f76b0a1d25bc45d8a24fece2bb66b4d0:545305342799511981", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/f76b0a1d25bc45d8a24fece2bb66b4d0/545305342799511981?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.45", "MACAddress": "00-50-56-b4-c8-69", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305227691032830", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305227881873665", "ProcessStartTime": "1711628195", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "f76b0a1d25bc45d8a24fece2bb66b4d0", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
30
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4fd"}, "preview": false, "result": {"_time": "2024-03-28T07:29:03.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:b35e7589c3034cc19a0472a30c5e9ac3:545299246480781184", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/b35e7589c3034cc19a0472a30c5e9ac3/545299246480781184?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.169", "MACAddress": "00-50-56-b4-5e-8a", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545299172777422577", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545299173011255028", "ProcessStartTime": "1711625308", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "b35e7589c3034cc19a0472a30c5e9ac3", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
31
{"_id": {"$oid": "6619a0f4ee51b4875ff0a504"}, "preview": false, "result": {"_time": "2024-03-28T05:13:40.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:09f03115c3f6493588c4301186970aae:545282111246606763", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/09f03115c3f6493588c4301186970aae/545282111246606763?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.62", "MACAddress": "00-50-56-b4-98-fb", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545282048907714854", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545282049120575785", "ProcessStartTime": "1711617142", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "09f03115c3f6493588c4301186970aae", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
32
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e0"}, "preview": false, "result": {"_time": "2024-03-28T14:10:25.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:2b231a30a1f9455797bf44c59245528e:545349757311622336", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/2b231a30a1f9455797bf44c59245528e/545349757311622336?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.19.12", "MACAddress": "00-50-56-b4-b4-99", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545349100459923462", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545349100746184712", "ProcessStartTime": "1711649115", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "2b231a30a1f9455797bf44c59245528e", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
33
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4ca"}, "preview": false, "result": {"_time": "2024-03-28T14:40:10.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:f01f1e69db8647cbbb064c06f59964bd:545353409639845415", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/f01f1e69db8647cbbb064c06f59964bd/545353409639845415?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.146", "MACAddress": "00-50-56-b4-69-24", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545353329417489846", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545353329574776249", "ProcessStartTime": "1711651131", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "f01f1e69db8647cbbb064c06f59964bd", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
34
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d3"}, "preview": false, "result": {"_time": "2024-03-28T13:45:16.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:a04b143ffe4d4799b424fa1621584fe6:545346492922781320", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/a04b143ffe4d4799b424fa1621584fe6/545346492922781320?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.49", "MACAddress": "00-50-56-b4-df-24", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545346419559161319", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545346419847519722", "ProcessStartTime": "1711647837", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "a04b143ffe4d4799b424fa1621584fe6", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
35
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4da"}, "preview": false, "result": {"_time": "2024-03-28T14:34:10.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:d037ce0d65ee478a89941f6f9668ae0c:545352660336739562", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/d037ce0d65ee478a89941f6f9668ae0c/545352660336739562?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.0.186", "MACAddress": "00-50-56-b4-d6-a2", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545352563409519675", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545352563593020478", "ProcessStartTime": "1711650766", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "d037ce0d65ee478a89941f6f9668ae0c", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
36
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f6"}, "preview": false, "result": {"_time": "2024-03-28T08:18:31.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:72c3688c4b064135bd30ce0efc7e88da:545305313575156229", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/72c3688c4b064135bd30ce0efc7e88da/545305313575156229?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.44", "MACAddress": "00-50-56-b4-be-65", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305230482848062", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305230790080833", "ProcessStartTime": "1711628196", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "72c3688c4b064135bd30ce0efc7e88da", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
37
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4c9"}, "preview": false, "result": {"_time": "2024-03-28T14:40:21.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:3c96f6d6075b4bfea9fa2759260946e8:545353444151780849", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/3c96f6d6075b4bfea9fa2759260946e8/545353444151780849?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.160", "MACAddress": "00-50-56-b4-ea-26", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545353348001555750", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545353348177716521", "ProcessStartTime": "1711651140", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "3c96f6d6075b4bfea9fa2759260946e8", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
38
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f1"}, "preview": false, "result": {"_time": "2024-03-28T09:04:49.000-04:00", "ContextTimeStamp": "133561045898940000", "DataDomains": "Identity", "DetectDescription": "A user didn't respond to a policy identity verification request", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:693718A9-42E0-4D80-8CA1-967A1A134DF3", "DetectName": "Identity verification timed out", "EndTime": "133561045898940000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:693718A9-42E0-4D80-8CA1-967A1A134DF3?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "IdpPolicyRuleName": "acme - MFA RDP (Non Programmatic)", "PatternId": "51142", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "E19571", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-844105", "SourceAccountUpn": "E19571@hq.acme.com", "SourceEndpointAccountObjectGuid": "1A705D05-98B2-4398-9C65-24DEF216EED0", "SourceEndpointHostName": "MXL34555CL", "SourceEndpointIpAddress": "10.48.18.88", "SourceEndpointSensorId": "a4080285c3424a4982dc4df5fdf41871", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561045898940000", "TargetEndpointAccountObjectGuid": "C039EB99-79AF-4D3C-99A2-B0C13C1B3A2E", "TargetEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-659369", "TargetEndpointHostName": "mxl2453v9w.hq.acme.com", "TargetEndpointSensorId": "00674ce00c4640a48efe883815a6ab33", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
39
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4f2"}, "preview": false, "result": {"_time": "2024-03-28T08:20:45.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:2fbb55efa03e4c7da9bd516de1cbfe0a:545305682374459608", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/2fbb55efa03e4c7da9bd516de1cbfe0a/545305682374459608?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.4.50", "MACAddress": "00-50-56-b4-28-29", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545305585375936553", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545305585624449068", "ProcessStartTime": "1711628365", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "2fbb55efa03e4c7da9bd516de1cbfe0a", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
40
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4fe"}, "preview": false, "result": {"_time": "2024-03-28T07:27:57.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:f86dd4e4bfe44620827779c6c304039e:545299006715106896", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/f86dd4e4bfe44620827779c6c304039e/545299006715106896?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "9f55bc60b96b4323a07e80fd71ea2317,b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.13", "MACAddress": "00-50-56-b4-d9-04", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545298940434617775", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545298940665304498", "ProcessStartTime": "1711625197", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "f86dd4e4bfe44620827779c6c304039e", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
41
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4d5"}, "preview": false, "result": {"_time": "2024-03-28T13:29:50.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:4fcae5287b5848c7a36c8bfb948b55a4:545344570348106365", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/4fcae5287b5848c7a36c8bfb948b55a4/545344570348106365?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.84", "MACAddress": "00-50-56-b4-6e-8d", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344484396331448", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344484589269435", "ProcessStartTime": "1711646914", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "4fcae5287b5848c7a36c8bfb948b55a4", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
42
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4dc"}, "preview": false, "result": {"_time": "2024-03-28T14:40:46.000-04:00", "ContextTimeStamp": "133561247532290000", "DataDomains": "Identity", "DetectDescription": "A user didn't respond to a policy identity verification request", "DetectId": "d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:48740549-7E23-4F1F-BE7C-CF4396880207", "DetectName": "Identity verification timed out", "EndTime": "133561247532290000", "FalconHostLink": "https://falcon.crowdstrike.com/identity-protection/detections/d5ab96d68d4b4598b368d3a8efdc8da4:ind:d5ab96d68d4b4598b368d3a8efdc8da4:48740549-7E23-4F1F-BE7C-CF4396880207?_cid=d5ab96d68d4b4598b368d3a8efdc8da4", "IdpPolicyRuleName": "acme - MFA RDP (Non Programmatic)", "PatternId": "51142", "Severity": "2", "SeverityName": "Informational", "SourceAccountDomain": "HQ.acme.COM", "SourceAccountName": "V43793", "SourceAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-950592", "SourceAccountUpn": "v43793@aflhq", "SourceEndpointAccountObjectGuid": "835AA0EA-7BB6-443A-9FB3-9C773DA0F6A7", "SourceEndpointHostName": "VWENICWX005", "SourceEndpointIpAddress": "10.52.4.90", "SourceEndpointSensorId": "a0a40933a54d4fda9b5105439c9548e7", "SourceProducts": "Falcon Identity Protection", "SourceVendors": "CrowdStrike", "StartTime": "133561247532290000", "TargetEndpointAccountObjectGuid": "E224E2FA-58B5-4BE9-8E39-EB95427F83AC", "TargetEndpointAccountObjectSid": "S-1-5-21-15365455-855514238-1361462980-704351", "TargetEndpointHostName": "pdnmgmt01.hq.acme.com", "TargetEndpointSensorId": "95760fb41242404a7cf23044e9c2cec1", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
43
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e7"}, "preview": false, "result": {"_time": "2024-03-28T11:37:23.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:105a2bd6c9ff40f29e94a482d2f69d4d:545330404225677384", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/105a2bd6c9ff40f29e94a482d2f69d4d/545330404225677384?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.78", "MACAddress": "00-50-56-b4-41-71", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545330332207380403", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545330332364666806", "ProcessStartTime": "1711640165", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "105a2bd6c9ff40f29e94a482d2f69d4d", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
44
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e9"}, "preview": false, "result": {"_time": "2024-03-28T11:07:31.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:075ce187026e44489457fb3c7f288db6:545326641359895140", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/075ce187026e44489457fb3c7f288db6/545326641359895140?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.149", "MACAddress": "00-50-56-b4-95-0e", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545326573316749817", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545326573474036220", "ProcessStartTime": "1711638373", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "075ce187026e44489457fb3c7f288db6", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
45
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4ef"}, "preview": false, "result": {"_time": "2024-03-28T09:38:05.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:6009ec2d205b4fc3947e19b38be67369:545315385393687263", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/6009ec2d205b4fc3947e19b38be67369/545315385393687263?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.5.27", "MACAddress": "00-50-56-b4-10-6f", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545315316491758178", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545315316726639205", "ProcessStartTime": "1711633005", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "6009ec2d205b4fc3947e19b38be67369", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
46
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4fa"}, "preview": false, "result": {"_time": "2024-03-28T07:29:45.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:eb057d7668304de6aed2e026436d8161:545299235378304322", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/eb057d7668304de6aed2e026436d8161/545299235378304322?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.165", "MACAddress": "00-50-56-b4-fe-83", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545299167669654697", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545299167903487148", "ProcessStartTime": "1711625305", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "eb057d7668304de6aed2e026436d8161", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
47
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e2"}, "preview": false, "result": {"_time": "2024-03-28T13:32:36.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:610c09f814e141dfbe175842b8ee2dfd:545344992534049585", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/610c09f814e141dfbe175842b8ee2dfd/545344992534049585?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.126", "MACAddress": "00-50-56-b4-28-c4", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545344915902018044", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545344916201910783", "ProcessStartTime": "1711647120", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "610c09f814e141dfbe175842b8ee2dfd", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
48
{"_id": {"$oid": "6619a0f4ee51b4875ff0a4e6"}, "preview": false, "result": {"_time": "2024-03-28T11:51:18.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:aaca33d9b0ed4e74bb9001193486c567:545332152996821170", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/aaca33d9b0ed4e74bb9001193486c567/545332152996821170?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.4.243", "MACAddress": "00-50-56-b4-5f-52", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "wininit.exe", "ParentImageFileName": "\\Device\\HarddiskVolume2\\Windows\\System32\\wininit.exe", "ParentProcessId": "545332080407050235", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545332080688068606", "ProcessStartTime": "1711640999", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "aaca33d9b0ed4e74bb9001193486c567", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "0", "tpfpByModel": "fp"}}
false positive
49
{"_id": {"$oid": "6619a0f4ee51b4875ff0a5cc"}, "preview": false, "result": {"_time": "2024-03-28T13:39:53.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:d443ad176e6f44cc97d5da443e7901c1:545345915295177988", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/d443ad176e6f44cc97d5da443e7901c1/545345915295177988?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "N/A", "MACAddress": "N/A", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545345263967128038", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545345264176843241", "ProcessStartTime": "1711647286", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "d443ad176e6f44cc97d5da443e7901c1", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
0
{"_id": {"$oid": "6619a0f4ee51b4875ff0a69e"}, "preview": false, "result": {"_time": "2024-03-28T06:02:28.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:be9d5a0955994a888982502c24b8bbbc:545288270759629518", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/be9d5a0955994a888982502c24b8bbbc/545288270759629518?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.174", "MACAddress": "00-50-56-b4-10-4b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545288182204240433", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545288182495744564", "ProcessStartTime": "1711620067", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "be9d5a0955994a888982502c24b8bbbc", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
1
{"_id": {"$oid": "6619a0f4ee51b4875ff0a892"}, "preview": false, "result": {"_time": "2024-03-28T06:11:43.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:a48390a921ad4e39a888281951a156f7:545289490047666005", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/a48390a921ad4e39a888281951a156f7/545289490047666005?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.11", "MACAddress": "00-50-56-b4-3d-fb", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545289345825474170", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545289346146338429", "ProcessStartTime": "1711620622", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "a48390a921ad4e39a888281951a156f7", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
2
{"_id": {"$oid": "6619a0f5ee51b4875ff0a8f0"}, "preview": false, "result": {"_time": "2024-03-28T05:23:38.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:912e1d9c26f447498797eafb0152b2e1:545283391450896588", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/912e1d9c26f447498797eafb0152b2e1/545283391450896588?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.3.7", "MACAddress": "00-50-56-b4-ed-57", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545283293303134255", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545283293483489330", "ProcessStartTime": "1711617736", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "912e1d9c26f447498797eafb0152b2e1", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
3
{"_id": {"$oid": "6619a0f5ee51b4875ff0a8b3"}, "preview": false, "result": {"_time": "2024-03-28T00:09:51.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:0b87908654cd4208a17f6b4ecd88cbd2:545243904109828248", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/0b87908654cd4208a17f6b4ecd88cbd2/545243904109828248?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.83", "MACAddress": "00-50-56-b4-78-b8", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545243812364670907", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545243812624717758", "ProcessStartTime": "1711598910", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "0b87908654cd4208a17f6b4ecd88cbd2", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
4
{"_id": {"$oid": "6619a0f5ee51b4875ff0ac5e"}, "preview": false, "result": {"_time": "2024-03-27T13:44:57.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:0362476aa9c54810bee51b7d04de1ae8:545165275607597231", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/0362476aa9c54810bee51b7d04de1ae8/545165275607597231?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.4", "MACAddress": "00-50-56-b4-35-15", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "545165187315400730", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "545165187504144413", "ProcessStartTime": "1711561418", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "0362476aa9c54810bee51b7d04de1ae8", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
5
{"_id": {"$oid": "6619a0f7ee51b4875ff0b617"}, "preview": false, "result": {"_time": "2024-03-20T08:04:19.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:f76b0a1d25bc45d8a24fece2bb66b4d0:543854070800763922", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/f76b0a1d25bc45d8a24fece2bb66b4d0/543854070800763922?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.232", "MACAddress": "00-50-56-b4-61-0f", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "543853968139930503", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "543853968713501578", "ProcessStartTime": "1710936180", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
6
{"_id": {"$oid": "6619a0f7ee51b4875ff0b60b"}, "preview": false, "result": {"_time": "2024-03-20T08:27:11.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:a2f87d51354d47ebadfe0c8255b5170f:543856949708809534", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/a2f87d51354d47ebadfe0c8255b5170f/543856949708809534?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.216", "MACAddress": "00-50-56-b4-3f-6a", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "543856836123911345", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "543856836771931316", "ProcessStartTime": "1710937548", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
7
{"_id": {"$oid": "6619a0f7ee51b4875ff0b6fb"}, "preview": false, "result": {"_time": "2024-03-25T09:38:46.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:3bda5cbb414a48d6a194cb146d35cd58:544771900007105772", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/3bda5cbb414a48d6a194cb146d35cd58/544771900007105772?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.236", "MACAddress": "00-50-56-b4-98-af", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544771809899824203", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544771810075984974", "ProcessStartTime": "1711373841", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "3bda5cbb414a48d6a194cb146d35cd58", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
8
{"_id": {"$oid": "6619a0f7ee51b4875ff0b848"}, "preview": false, "result": {"_time": "2024-03-23T00:07:08.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:b141c0f5a6f348eca724a975ab426a90:544337583155564370", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/b141c0f5a6f348eca724a975ab426a90/544337583155564370?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.1.222", "MACAddress": "00-50-56-b4-3e-b0", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544337501637168801", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544337501808086692", "ProcessStartTime": "1711166747", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
9
{"_id": {"$oid": "6619a0f8ee51b4875ff0ba95"}, "preview": false, "result": {"_time": "2024-03-20T06:14:37.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:ef8bac6b543941338c56ff323eec19ec:543840300144824546", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/ef8bac6b543941338c56ff323eec19ec/543840300144824546?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.3.73", "MACAddress": "00-50-56-b4-3f-d6", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "543840231580536941", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "543840231859458160", "ProcessStartTime": "1710929630", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
10
{"_id": {"$oid": "6619a0f8ee51b4875ff0bc38"}, "preview": false, "result": {"_time": "2024-03-25T08:23:18.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:9f801f7ce7bd4db0ac9cee9044278c50:544762410301302618", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/9f801f7ce7bd4db0ac9cee9044278c50/544762410301302618?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "f7508e1b404c4ae19d360cad456951eb,b71b37030ffc4f14a0dead1b844f4835", "LocalIP": "10.52.3.192", "MACAddress": "00-50-56-b4-44-48", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544762322045806261", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544762322226161336", "ProcessStartTime": "1711369317", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "9f801f7ce7bd4db0ac9cee9044278c50", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
11
{"_id": {"$oid": "6619a0f9ee51b4875ff0bc4b"}, "preview": false, "result": {"_time": "2024-03-25T01:13:32.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:d517ead34a2947abac975d849f4e5651:544708415471129666", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/d517ead34a2947abac975d849f4e5651/544708415471129666?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.2.236", "MACAddress": "00-50-56-b4-a4-4b", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544708357103195043", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544708357256287142", "ProcessStartTime": "1711343585", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "d517ead34a2947abac975d849f4e5651", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
12
{"_id": {"$oid": "6619a0f9ee51b4875ff0bc46"}, "preview": false, "result": {"_time": "2024-03-25T05:28:16.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:7f7c5e7666db43f89ec2abbd4ba0500d:544740373466420757", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/7f7c5e7666db43f89ec2abbd4ba0500d/544740373466420757?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb,9f55bc60b96b4323a07e80fd71ea2317", "LocalIP": "10.52.3.38", "MACAddress": "00-50-56-b4-5f-46", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544740302661326232", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544740302802883995", "ProcessStartTime": "1711358817", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "7f7c5e7666db43f89ec2abbd4ba0500d", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
13
{"_id": {"$oid": "6619a0f9ee51b4875ff0bd30"}, "preview": false, "result": {"_time": "2024-03-24T15:04:22.000-04:00", "CommandLine": "C:\\WINDOWS\\system32\\services.exe", "DetectDescription": "A process attempted to modify Falcon sensor service configuration via the registry. This is indicative of an attempt to tamper with Falcon sensor or obtain persistence on a system. Investigate the registry operation and process tree.", "DetectId": "ldt:4597f689bd6b44ba91330474aaa2c68e:544631658327219650", "DetectName": "Suspicious Activity", "FalconHostLink": "https://falcon.crowdstrike.com/activity/detections/detail/4597f689bd6b44ba91330474aaa2c68e/544631658327219650?_cid=g03000w7ktoajvf5c77gaacpsaboikfy", "FileName": "services.exe", "FilePath": "\\Device\\HarddiskVolume2\\Windows\\System32", "GrandparentCommandLine": "", "GrandparentImageFileName": "", "HostGroups": "b71b37030ffc4f14a0dead1b844f4835,f7508e1b404c4ae19d360cad456951eb", "LocalIP": "10.52.0.197", "MACAddress": "00-50-56-b4-ae-18", "MD5String": "e606e7e0d5e94af8222715a24df0776b", "Objective": "Keep Access", "ParentCommandLine": "", "ParentImageFileName": "", "ParentProcessId": "544631601151515977", "PatternDispositionDescription": "Registry Operation Blocked", "PatternDispositionFlags.BlockingUnsupportedOrDisabled": "false", "PatternDispositionFlags.BootupSafeguardEnabled": "false", "PatternDispositionFlags.CriticalProcessDisabled": "false", "PatternDispositionFlags.Detect": "false", "PatternDispositionFlags.FsOperationBlocked": "false", "PatternDispositionFlags.HandleOperationDowngraded": "false", "PatternDispositionFlags.InddetMask": "false", "PatternDispositionFlags.Indicator": "false", "PatternDispositionFlags.KillActionFailed": "false", "PatternDispositionFlags.KillParent": "false", "PatternDispositionFlags.KillProcess": "false", "PatternDispositionFlags.KillSubProcess": "false", "PatternDispositionFlags.OperationBlocked": "false", "PatternDispositionFlags.PolicyDisabled": "false", "PatternDispositionFlags.ProcessBlocked": "false", "PatternDispositionFlags.QuarantineFile": "false", "PatternDispositionFlags.QuarantineMachine": "false", "PatternDispositionFlags.RegistryOperationBlocked": "true", "PatternDispositionFlags.Rooting": "false", "PatternDispositionFlags.SensorOnly": "false", "PatternDispositionFlags.SuspendParent": "false", "PatternDispositionFlags.SuspendProcess": "false", "PatternDispositionValue": "4096", "PatternId": "10369", "ProcessEndTime": "0", "ProcessId": "544631601298316620", "ProcessStartTime": "1711306985", "SHA1String": "0000000000000000000000000000000000000000", "SHA256String": "43ec773e0ec626bf6d8a7fd04e64dc36afa6801444a3c36ef4da2a909fa0d83f", "SensorId": "4597f689bd6b44ba91330474aaa2c68e", "Severity": "4", "SeverityName": "High", "Tactic": "Defense Evasion", "Technique": "Disable or Modify Tools", "tpByModel": "1", "tpfpByModel": "tp"}}
true positive
14
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
5
Edit dataset card