Drive-by Compromise Incident
EDR Alert Alert Source: Microsoft Defender for Endpoint (MDE)Alert Time: 2023-10-26 14:32:18 UTCSeverity: HighDevice: FIN-0789 (Windows 10, Finance Department)User: jane.doe@company.comAlert Title: “Suspicious script execution indicative of drive-by download”Alert ID: INC-2023-2678 Alert Details: Detection: TrojanDownloader:PowerShell/CobaltStrike Path: C:\Users\jane.doe\AppData\Local\Temp\update_check.ps1 Parent Process: msedge.exe (PID: 7845) Command Line: powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -File “C:\Users\jane.doe\AppData\Local\Temp\update_check.ps1” Process Tree: svchost.exe (services) -> msedge.exe (PID: 7845, visited: hxxps://adobe-flash-update[.]online) -> cmd.exe … Read more