AIFT Forensic Report | Flip Forensics
| Filename | 20240212-decrypted-Windows_Server_2022.E01 |
|---|---|
| SHA-256 | 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7 |
| MD5 | 6f912bbaa1500f4556bd6b4fa8466f02 |
| File Size | 1.46 GB (1572845047 bytes) |
| Hostname | WIN-NI9FBK23SLO |
| OS | Windows Server 2022 Standard (NT 10.0) 20348.1850 |
| Domain | branchoffice.example.com |
| IPs | 10.44.0.12 |
On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.
Look for any suspicious behaviour aside from these two IOC's.
Executive Summary
The evidence shows clear use of PsExec‑related tools, a malicious‑looking scheduled task, and extensive admin‑share enumeration shortly before the Red Petya ransom screen appeared on 12 Feb 2024. While the ransomware binary redpetya.exe itself was never seen in any artifact, the combination of a “Enterpries backup” task that runs PsExec (tasks row 5, 2024‑02‑06 21:49:21.961830 UTC) and multiple Sysinternals downloads, execution traces (BAM row 13 & 23, 2024‑02‑06/09), and remote‑share activity (Shellbags rows 4‑32, early Feb 2024) strongly suggests the host was compromised and used for lateral movement and payload deployment. Confidence that the system was compromised: HIGH; overall severity: CRITICAL because the host displayed ransomware and likely participated in spreading it.
---
| Timestamp (UTC) | Source Artifact | Event | Confidence |
|---|---|---|---|
| 2024‑02‑05 23:13:17 – 23:14:39 | Browser.history / browser.downloads / shimcache / amcache | Download of Sysinternals Suite (contains PsExec) – evidence of tool staging. | HIGH |
| 2024‑02‑05 23:14:39.491949 – 23:14:39.522984 | Shimcache | C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe & PsExec64.exe recorded. | HIGH |
| 2024‑02‑05 23:14:49.615999 | Recycle Bin | Deletion of SysinternalsSuite.zip (admin). | MEDIUM |
| 2024‑02‑05 23:25:15.663250 | Shimcache | \\10.44.24.9\admin$\PSEXESVC.exe (PsExec service binary on remote share). | HIGH |
| 2024‑02‑05 23:40:22 – 23:41:28 | Browser.history / browser.downloads | Search for and download of Nmap installer. | HIGH |
| 2024‑02‑06 00:06:00 | SRUM.application | Execution of nmap.exe & zenmap.exe (foreground cycle time logged). | MEDIUM |
| 2024‑02‑06 21:49:21.961830 | Scheduled Tasks (tasks) – row 4 | Creation of Enterpries backup task (run level HighestAvailable, user admin). | HIGH |
| 2024‑02‑06 21:49:21.961830 | Scheduled Tasks – row 5 | Task command = C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe; arguments include -u admin -p letmein … rename.exe. | HIGH |
| 2024‑02‑06 22:14:12.373672 – 22:14:14.995445 | Amcache | psexec.exe and psexec64.exe recorded in admin’s Downloads folder. | HIGH |
| 2024‑02‑06 22:14:12.975912 – 22:55:44.556122 | BAM/DAM | Execution of PsExec64.exe and PsExec.exe from the same folder. | HIGH |
| 2024‑02‑07 04:04:00 | Shellbags – row 63 | Access to Desktop\important.zip (potential staging archive). | MEDIUM |
| 2024‑02‑07 08:16‑08:39 | Shellbags – rows 4‑32 | Enumeration of admin shares on hosts 10.44.24.1‑9 (c$). | HIGH |
| 2024‑02‑07 22:53:05 – 22:56:00 | SRUM.application | Execution of rename.exe (desktop) and repeated DismHost.exe from temp folders. | MEDIUM |
| 2024‑02‑08 08:30 – 08:40 | Shellbags – rows 4, 17, 22, 27, 32 | Continued remote‑share browsing of multiple workstations. | HIGH |
| 2024‑02‑09 22:53 – 22:56 | UserAssist – rows 27, 14 | Interactive launch of PsExec64.exe / PsExec.exe via Explorer. | HIGH |
| 2024‑02‑09 22:55 – 22:56 | BAM/DAM – rows 13, 23 | Final PsExec executions recorded before telemetry stops. | HIGH |
| 2024‑02‑12 ??:??:?? | Incident observation (outside collected data) | Red Petya ransomware screen displayed on the server. | — |
(All timestamps are taken directly from the listed artifacts; confidence reflects the strength of the supporting evidence.)
---
| IOC | Observation | Supporting Artifact(s) |
|---|---|---|
| redpetya.exe | Not Observed – no entry in Run/RunOnce, Scheduled Tasks, Services, ShimCache, Amcache, BAM/DAM, UserAssist, MUICache, or any other artifact. | — |
| PsExec / PsExec‑related activity | Observed – multiple PsExec binaries downloaded, executed, and referenced in a scheduled task; also a remote service binary PSEXESVC.exe seen on a network share. | Shimcache rows 120/122, Amcache rows 71‑73, BAM/DAM rows 13/23, Scheduled‑Task row 5, Shellbags remote‑share entries, UserAssist rows 27/14, SRUM (application) – no direct PsExec record but corroborated by other sources. |
---
| Phase | Evidence (Confirmed) | Inferred / Uncertain |
|---|---|---|
| Initial Access | Likely credential reuse or privileged admin account (admin) used to create a scheduled task and browse admin shares (Shellbags rows 4‑32, 2024‑02‑07). No direct log of how credentials were obtained. | The exact entry vector (phishing, credential dump, or stolen password) is unknown. |
| Execution | PsExec binaries executed from the admin’s Downloads folder (BAM/DAM rows 13/23; UserAssist rows 27/14). The Enterpries backup task explicitly invokes PsExec with clear‑text credentials (-u admin -p letmein). | Whether PsExec was used to launch the ransomware payload (redpetya.exe) is not directly logged. |
| Persistence | Creation of the Enterpries backup scheduled task (tasks row 4) with HighestAvailable run level; the task remains on disk after creation. No service persistence observed (services artifact). | No evidence of further persistence mechanisms (registry Run keys, additional tasks) beyond this task. |
| Privilege Escalation / Lateral Movement | Remote admin‑share enumeration across five workstations (Shellbags rows 4‑32) and presence of PSEXESVC.exe on \\10.44.24.9\admin$ (Shimcache row 8) strongly indicate lateral movement using PsExec. | No explicit log of successful remote command execution on those hosts (e.g., SMB session logs). |
| Discovery / Recon | Execution of Nmap (nmap.exe / zenmap.exe) recorded in SRUM (2024‑02‑06) and download of Nmap installer (browser.history rows 12‑20). | The scan targets and results are unknown. |
| Collection / Staging | Presence of important.zip on the desktop (Shellbags row 63) and numerous user‑profile folder accesses (Shellbags many rows) suggest data collection. | No file‑hash or exfiltration logs to confirm actual theft. |
| Exfiltration | No network flow or FTP upload logs captured; a single FTP URL to an external IP appears in browser.history (2024‑02‑07 16:57:31, row 50) – possible exfiltration channel. | No confirmation that data was successfully transferred. |
| Impact – Ransomware Execution | Red Petya ransomware screen observed on 12 Feb 2024. No forensic trace of the binary itself, but the timeline of PsExec usage, custom rename.exe launch, and scheduled task execution align with a probable payload delivery shortly after 9 Feb. | Direct evidence of redpetya.exe execution is missing; the ransomware may have been delivered in‑memory or from a remote share not logged. |
Overall Narrative: An admin‑level account created a HIGH‑privilege scheduled task that launched PsExec with hard‑coded credentials to run a local utility (rename.exe). Concurrently, the attacker used PsExec to move laterally across several workstations, enumerated admin shares, and performed internal network scans with Nmap. Staging files (e.g., important.zip) were prepared, and a brief FTP connection to an external server was made. Within days, the Red Petya ransomware displayed on the server, likely deployed by the PsExec‑driven chain, even though the binary itself was not captured in the collected artifacts.
---
| Gap | Why it matters / possible anti‑forensic sign |
|---|---|
| No post‑12 Feb logs (tasks, BAM/DAM, SRUM stop on 9‑10 Feb) | Could indicate log clearing or collection cut‑off before the final ransomware execution. |
| Missing process‑creation (Sysmon/4688) and security event logs | Prevents verification of exact command‑line arguments, parent‑process trees, and authentication events for PsExec. |
**No file‑system metadata for redpetya.exe or rename.exe** | Hinders confirmation that the ransomware binary existed or was executed from disk. |
| Zero entries in SRUM network data and Defender quarantine | May suggest SRUM was disabled/cleared or Defender was not active, both possible anti‑forensic actions. |
| No SMB session or Netlogon logs | Unable to prove successful remote service creation or file copies to the observed admin shares. |
| No hash values for many binaries (PsExec, rename.exe, important.zip) | Limits ability to compare against known malicious versions or detect tampering. |
| Scheduled‑task trigger details missing | We cannot ascertain whether the task ran automatically at the time of the ransomware event. |
| SAM snapshot predates incident (2023‑09‑24) | No visibility into account changes, new privileged users, or password resets around the attack window. |
---
Immediate Containment (if still online)
admin account** and any other privileged accounts; enforce MFA.Evidence Collection
netstat -an, Windows Firewall logs).redpetya.exe, rename.exe, or important.zip.Analysis
rename.exe, and the ZIP archives; compare against threat‑intel feeds.185.239.106.67 and any SMB traffic to the 10.44.24.* hosts.Remediation / Prevention
By addressing the gaps above and following the containment and collection steps, the team can confirm whether the Red Petya payload was executed, determine the full scope of lateral movement, and prevent further compromise across the branch office environment.
Findings
None – no autorun entries in the Run/RunOnce keys show suspicious paths, LOLBins, encoded arguments, or known malicious binaries.
IOC Status
SecurityHealthSystray.exe (row 1) and VBoxTray.exe (row 2); no reference to redpetya.exe appears.psexec.exe or any PsExec‑related arguments.Data Gaps
Additional artifacts to examine: full Registry hive (including all Run/RunOnce sub‑keys), Sysmon event logs (process creation, network connections), SMB/Remote Service logs for PsExec activity, and file system metadata for the redpetya.exe binary.
Findings
admin) with run level HighestAvailable.task_path C:\Windows\system32\tasks\Enterpries backup; date 2024-02-06T21:49:21.961830+00:00; user_id admin; display_name Enterpries backup; run_level HighestAvailable (row 4).rename.exe from the admin’s Desktop with clear‑text credentials (-u admin -p letmein).arguments "-accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe" and command C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row 5).rename.exe) strongly indicates malicious activity, possibly the deployment of ransomware components.rename.exe on the filesystem, hash it, and compare against known Red Petya payloads; review network logs for outbound SMB connections to the listed desktops.C:\Windows\explorer.exe with the argument /NoUACCheck.command C:\Windows\explorer.exe and arguments /NoUACCheck.IOC Status
Data Gaps
rename.exe), preventing direct malware identification._dedup_comment notes many deduplicated records, suggesting multiple identical entries may have been collapsed; if an adversary cleared or edited the task schedule, the original timestamps could be lost.Additional artifacts that would aid the investigation: TaskScheduler EVTX logs, file system metadata for rename.exe and PsExec.exe (creation/modification times, hashes), network connection logs to the listed desktops, and any process creation events (Process Creation EVTX) for the PsExec execution.
Findings
redpetya.exe.imagepath column contains only system paths (e.g., %SystemRoot%\system32\svchost.exe, C:\Program Files (x86)\Microsoft\Edge\...) and never the filename redpetya.exe. No row mentions this name.psexec) without being registered as a service, or the service could have been created after 2024‑02‑07 (the latest record).psexesvc or similar).name column does not contain entries such as psexesvc, PsExecSvc, or any other unconventional service name. All listed services are known Windows or vendor components.-s flag to run directly without installing a service, or any PsExec‑related service was created after the last timestamp (2024‑02‑07 20:59).psexesvc.exe execution around the incident window.start column shows 105 Auto‑Start entries, all of which correspond to standard Windows components (e.g., WinDefend, W32Time, WpnService). No service with a creation timestamp after 2023‑09‑24 (the bulk of the data) shows a start type of “Auto” that is atypical.IOC Status
psexesvc or similar service name appears.Data Gaps
psexesvc.exe or psexec.exe. Those logs are not present, so lateral‑movement via PsExec cannot be ruled out.redpetya.exe binary existed on the system (e.g., from an MSFT_FileName artifact) is absent, so we cannot verify whether it was ever placed on disk.Recommended Next Steps
redpetya.exe to confirm if the binary was ever written to disk.Conclusion: Within the provided services data (up to 07 Feb 2024), there is no concrete evidence of malicious services, the ransomware binary, or PsExec‑related service creation. The lack of coverage for the CRITICAL post‑incident period is the primary limitation. Further log collection covering the incident dates is required for a definitive assessment.
IOC Status
Data Gaps
wmic /namespace:\\root\subscription path __eventfilter list /format:csv, eventconsumer, and __filtertoconsumerbinding), and correlate with system logs (EVTX, Prefetch, ShimCache) and network traffic to evaluate the suspected PsExec activity and the redpetya.exe payload.Findings
2024‑02‑05T23:25:15.663250+00:00 – \\10.44.24.9\admin$\PSEXESVC.exe (PsExec service executable on a remote admin share).2024‑02‑05T23:14:39.491949+00:00 – C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (local copy of PsExec).2024‑02‑05T23:14:39.522984+00:00 – C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe.10.44.24.9 around the same timestamps; also check Prefetch/Amcache for execution artifacts.2024‑02‑05 showing copies of Sysinternals tools in C:\Users\admin\Downloads\SysinternalsSuite\ such as: pslist.exe, pslist64.exe, pskill.exe, pskill64.exe, PsInfo.exe, PsInfo64.exe, pspasswd.exe, pspasswd64.exe, psloglist.exe, psloglist64.exe, PsLoggedon.exe, PsLoggedon64.exe, procmon.exe, procmon64.exe, procdump.exe, procdump64.exe, ADExplorer.exe, ADExplorer64.exe, Autoruns.exe, Autoruns64.exe, Bginfo.exe, Bginfo64.exe, etc. (rows 31‑58, 59‑68, 70‑84, 90‑114, 119‑138, 140‑154).pslist, psinfo), credential enumeration (PsLoggedon, PsGetSid), and dumping memory (procdump). Their presence in a user’s temp/download directory shortly before the ransomware incident suggests they were staged for post‑compromise activity.\\10.44.24.9\admin$ indicating possible file staging or remote execution.**2019‑12‑06T21:29:00+00:00 – \\10.44.24.9\admin$\write.exe.2019‑12‑07T09:10:00.444992+00:00 – \\10.44.24.9\admin$\winhlp32.exe.2023‑11‑16T12:11:09.408899+00:00 – \\10.44.24.9\admin$\regedit.exe.2023‑11‑16T12:03:42.085066+00:00 – \\10.44.24.9\admin$\splwow64.exe.2023‑11‑16T12:13:19.602324+00:00 – \\10.44.24.9\admin$\notepad.exe.2019‑12‑07T09:09:39.615219+00:00 – \\10.44.24.9\admin$\hh.exe.2024‑01‑09T22:58:00.092497+00:00 – \\10.44.24.9\admin$\HelpPane.exe.2024‑01‑09T22:57:19.264709+00:00 – \\10.44.24.9\admin$\explorer.exe.2023‑11‑16T12:03:29.749149+00:00 – \\10.44.24.9\admin$\bfsvc.exe.dismhost.exe copies in temporary folders (e.g., rows 1‑2, 13‑14, 31‑...‑514).**dismhost.exe located in various %TEMP% sub‑folders dated 2021‑05‑08 (e.g., C:\Users\admin\AppData\Local\Temp\0498F23C-...dismhost.exe).dismhost.exe is a legitimate Windows component, the sheer number of temporary copies may indicate a tool or script that extracts or stages files (potentially used to hide malicious payloads). However, the timestamps are from 2021, well before the incident, and no recent copies appear.IOC Status
redpetya.exe path appears in the shimcache data.PSEXESVC.exe (row 8) and PsExec.exe / PsExec64.exe (rows 120, 122) are present.Data Gaps
10.44.24.9.dismhost.exe entries are old (2021) and may be unrelated, but without file metadata they cannot be definitively ruled out.Next steps: Correlate these shimcache entries with process creation logs, network traffic, and other persistence artifacts to verify actual execution and assess the extent of lateral movement and credential‑access activity.
Findings
2024-02-06T22:14:12.373672+00:00 – c:\users\admin\downloads\sysinternalssuite\psexec.exe – publisher “sysinternals – www.sysinternals.com” – row 71.2024-02-07T21:00:11.248564+00:00 – c:\users\administrator\downloads\sysinternalssuite\psexec64.exe – publisher “sysinternals – www.sysinternals.com” – row 72.2024-02-06T22:14:14.995445+00:00 – c:\users\admin\downloads\sysinternalssuite\psexec64.exe – publisher “sysinternals – www.sysinternals.com” – row 73.2023-09-24T21:08:17.211145+00:00 – c:\windows\system32\aggregatorhost.exe – publisher blank – row 1.2024-02-07T21:00:10.342958+00:00 – c:\users\admin\desktop\dir.exe – publisher blank – row 13.2024-02-07T21:00:10.562542+00:00 – c:\users\admin\desktop\rename.exe – publisher blank – row 80.2024-02-06T21:01:08.309662+00:00 – c:\program files (x86)\nmap\ncat.exe – publisher blank – row 59.2024-02-06T21:01:08.326410+00:00 – c:\program files (x86)\nmap\ndiff.exe – publisher blank – product “zenmap” – row 60.2024-02-07T21:00:11.233940+00:00 – c:\users\admin\downloads\nmap-7.93-setup.exe – publisher “insecure.org” – product “nmap” – row 62.2024-02-06T21:01:08.124117+00:00 – c:\program files\npcap\npcap.sys – publisher “insecure.com llc.” – product “npcap” – row 67.redpetya.exe) in the Amcache inventory.**path ends with redpetya.exe.redpetya.exe or its hash.IOC Status
Data Gaps
---
All conclusions are drawn strictly from the provided Amcache data; no external information was fabricated.
Findings
\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe (row 13)\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row 23)\Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe (row 15)\Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe (row 17)\Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe (row 16)\Device\HarddiskVolume2\Windows\System32\cmd.exe (row 12)\Device\HarddiskVolume2\Windows\System32\rundll32.exe (row 18)---
IOC Status
redpetya.exe → Not Observed – No entry for this filename appears in the BAM/DAM records.PsExec (both PsExec.exe and PsExec64.exe) → Observed – See rows 13 and 23 (timestamps above).---
Data Gaps
_dedup_comment indicates many duplicate events were collapsed; while expected for BAM, it obscures the exact count of executions, which could hide burst activity.redpetya.exe was ever executed on this host.These gaps mean the current BAM/DAM view provides strong indication of tool execution but cannot conclusively map the full attack timeline or confirm the presence of the ransomware binary on this particular server.
Findings
C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, 1 execution, 2024‑02‑06T22:14:10.115000Z, user admin.C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe, 1 execution, 2024‑02‑06T22:14:12.356998Z, user admin.cmd.exe.{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\cmd.exe, 7 executions, 2024‑02‑09T22:53:05.400000Z, user admin.cmd.exe processes to identify supplied arguments and any subsequent file writes or network activity.{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Nmap\zenmap.exe, 2 executions, 2024‑02‑06T21:09:13.195999Z, user admin.psshutdown64.exe.C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, 1 execution, 2024‑02‑05T23:14:20.084999Z, user admin.psshutdown can be used to reboot or shut down remote machines, a technique sometimes employed before ransomware encryption.IOC Status
Data Gaps
.lnk) and Scheduled Task artifacts** – may contain execution of redpetya.exe outside Explorer.These supplementary sources are required to determine the full extent of the compromise, confirm lateral movement, and locate the redpetya.exe binary.
Findings
2024-02-05T23:14:49.615999+00:00, C:\Users\admin\Downloads\SysinternalsSuite.zip, 50.6 MB, admin (row 2).share.zip file from the desktop.**2024-02-06T22:14:44.067999+00:00, C:\Users\admin\Desktop\share.zip, 0.65 GB, admin (row 1).share.zip and any associated file access or network transfer logs to determine its contents and purpose.IOC Status
Data Gaps
share.zip payload.Findings
2024-02-07T16:57:31.964310+00:00, URL ftp://185.239.106.67/branchoffice.example.com/, browser iexplore, username admin (row 50).185.239.106.67 is not a known internal service.185.239.106.67 for known C2 or malicious activity.2024-02-05T23:13:17.260740+00:00, URL https://www.bing.com/search?q=download+sysinternals+suite…, title download sysinternals suite - Search, username admin (row 8).2024-02-05T23:13:27.154423+00:00, URL https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite, title Sysinternals Suite - Sysinternals \| Microsoft Learn, username admin (row 11).2024-02-05T23:13:45.314323+00:00, URL file:///C:/Users/admin/Downloads/SysinternalsSuite.zip, username admin (row 43).psexec.exe or other Sysinternals utilities executed after 2024‑02‑05.2024-02-05T23:40:22.322380+00:00, URL https://www.bing.com/search?...download+nmap…, title download nmap - Search, username admin (row 12). Follow‑up URLs to Softonic download pages (rows 17‑20).nmap.exe binaries on disk and correlate with any subsequent network scan logs (e.g., Windows Firewall, IDS alerts).file:/// entries on 2024‑02‑05/07 for C:/scripts/activeDirectory_user_import.csv (row 45), C:/share/Clark.Nicholson/Documents/account_password.xlsx (row 46), C:/share/Clark.Nicholson/Documents/account_edit.docx (row 47), and C:/Users/admin/Desktop/RyukReadMe.txt (row 48).https://go.microsoft.com/fwlink/... and Welcome to Microsoft Edge (rows 1‑7, 23‑31, etc.).IOC Status
redpetya.exe → Not Observed (no record of this filename in the browser history).psexec → Not Observed (no URL or file reference to psexec.exe; however, Sysinternals Suite download is observed, which contains PsExec).Data Gaps
psexec.exe, redpetya.exe, nmap.exe). Without Sysmon or Windows Event logs, we cannot confirm tool execution.admin and Administrator accounts appear; privilege levels and session separation are unclear.Further artefacts to request: Sysmon/event logs, Windows Prefetch, MFT entries for the downloaded files, network PCAPs covering 2024‑02‑05 – 2024‑02‑12, and any Windows Security logs indicating credential dumping or lateral movement.
Findings
row_ref 1 – 2024‑02‑05T23:13:32.211950 Z → C:\Users\admin\Downloads\SysinternalsSuite.zip from https://download.sysinternals.com/files/SysinternalsSuite.zip (state = complete, browser = edge, user = admin). Also row_ref 3 – 2023‑11‑04T15:25:24.686308 Z → C:\Users\Administrator\Downloads\SysinternalsSuite.zip from the same URL (complete, user = Administrator).psexec.exe) on the same host.row_ref 2 – 2024‑02‑05T23:41:28.640888 Z → C:\Users\admin\Downloads\nmap-7.93-setup.exe from https://gsf-fl.softonic.com/.../nmap-7.93-setup.exe?... (state = complete, browser = edge, user = admin).nmap-7.93-setup.exe and subsequent nmap.exe processes, plus any command‑line arguments indicating host scanning, in process creation logs or Sysmon event streams.IOC Status
redpetya.exe appears in the browser‑downloads artifact.Data Gaps
Recommended next steps
psexec.exe, nmap.exe, or files extracted from the Sysinternals ZIP between 2024‑02‑05 and 2024‑02‑12.Findings
None – the Activities Cache artifact contains no records, so no suspicious behavior can be observed.
IOC Status
Data Gaps
Recommended Next Steps
IOC Status
Data Gaps
Recommended Follow‑up
Findings
2024-02-06T00:06:00+00:00 – \Device\HarddiskVolume2\Program Files (x86)\Nmap\nmap.exe (SID S‑1‑5‑21‑1057484085‑1795310446‑2370380301‑2611) – foreground cycle time = 221 269 249 429 cycles.2024-02-06T00:06:00+00:00 – \Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe (same SID) – foreground cycle time = 227 183 733 421 cycles.
DismHost.exe from transient Temp directories.**2023-12-13T09:13:00+00:00 – ...\Temp\20E089F8-EEF8-44B1-BBEC-E61F1584B677\DismHost.exe SID S‑1‑5‑18, foreground cycle time = 5 407 258 740; 2023-12-14T20:18:00+00:00 – ...\Temp\F454C235-AF12-47F8-9364-F55374E33E80\DismHost.exe foreground cycle time = 2 794 428 053; etc., spanning the whole investigation window).DismHost.exe is a legitimate DISM component, but its frequent launch from random %TEMP% paths is a known “Living‑off‑the‑Land” technique used to evade detection and execute code with elevated privileges.DismHost.exe instance (via Process Creation logs or Sysmon) and check the associated payload files for signs of malicious modules or scripts.rename.exe on the desktop.**2024-02-09T22:56:00+00:00 – \Device\HarddiskVolume2\Users\admin\Desktop\rename.exe (SID S‑1‑5‑21‑1057484085‑1795310446‑2370380301‑2611) – foreground cycle time = 13 284 139 184 cycles.redpetya.exe or psexec.exe.IOC Status
redpetya.exe → Not Observed (no matching app value in the SRUM records).psexec → Not Observed (no matching app value).Data Gaps
redpetya.exe or PsExec lateral movement) is outside the observable window.foreground_cycle_time (CPU cycles spent in the foreground). It lacks explicit process command‑line arguments, hashes, network connections, or parent‑process IDs, limiting the ability to confirm “living‑off‑the‑land” misuse of DismHost.exe or to associate the Nmap executions with a specific attacker command._dedup_comment column shows extensive deduplication (e.g., “Deduplicated 1346 records”). While deduplication is a normal export optimization, it obscures the raw event count and may hide spikes in activity that could be indicative of an attack.DismHost.exe, rename.exe, and the Nmap binaries.rename.exe and any redpetya.exe binaries** that may reside elsewhere on the disk.*Given the lack of direct evidence for the ransomware binary and PsExec, the most actionable leads are the Nmap scans and the anomalous DismHost.exe launches, which should be pursued with the supplemental logs above.*
Findings
2024-02-08T08:39:20+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.8\c$\Users (row 4).2024-02-08T08:22:12+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.1\c$\Users (row 17).2024-02-08T08:16:56+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.6\c$\Users (row 22).2024-02-08T08:29:48+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.7\c$\Users (row 27).2024-02-08T08:33:14+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.9\c$\Users (row 32).2023-09-24T20:02:32+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\WIN‑NI9FBK23SLO.branchoffice.example.com\home$\Jorden.Davidson (row 40).c$) on several internal IPs is a classic step in lateral‑movement attacks, often performed with tools such as PsExec. The timestamps (early February 2024) are immediately after the Red Petya outbreak, suggesting post‑infection credential use.admin).2024-02-05T23:13:42+00:00 – My Computer\{088e3905‑0323‑4b02‑9826‑5d99428e115f}\SysinternalsSuite.zip (row 60).2024-02-07T04:04:00+00:00 – My Computer\Desktop\important.zip (row 63).psexec.exe, procmon.exe, procdump.exe, or any process that extracts the zip contents.c$\Users\<username> and their Documents folders across hosts 10.44.24.8, .1, .6, .7, .9 during 2023‑2024.IOC Status
psexec.exe or related execution record is present; however, the remote admin‑share activity is consistent with PsExec usage.Data Gaps
ts_atime and ts_btime columns are empty, limiting ability to differentiate first‑time access from later updates.important.zip or SysinternalsSuite.zip contain malicious payloads.Recommended next steps
SysinternalsSuite.zip and important.zip** to compare against known malicious signatures.Findings
No suspicious entries are present in the MUICache data. All recorded FriendlyAppName / ApplicationCompany pairs correspond to legitimate Windows system components or Microsoft‑signed applications located in standard system directories (e.g., C:\Windows\system32, C:\Program Files). There are no entries for the file name redpetya.exe, nor any known lateral‑movement tools such as psexec.exe, and no anomalous executables in user‑writable locations.
IOC Status
Data Gaps
username field.%TEMP%, user profile) and later deleted, it would still appear in MUICache if the display string was cached. No such entries are present, suggesting either the binary was never run on this host or the cache was cleared/tampered with.In summary, the MUICache artifact does not reveal any execution of the Red Petya ransomware binary or PsExec, and shows only normal Microsoft‑signed activity. Further forensic sources are required to determine whether the ransomware was present or executed on this system.
Nothing suspicious observed in the SAM Users artifact: only the default built‑in accounts (Administrator, Guest, DefaultAccount, WDAGUtilityAccount) are present, each with placeholder timestamps (1601‑01‑01) and no evidence of recent creation, privilege changes, or password modifications【row_ref=1-4】.
IOC Status
Data Gaps
IOC Status
Data Gaps
Recommended next steps
| Timestamp | Action | Details |
|---|---|---|
| 2026-02-26T12:03:45.195Z | case_created | {"case_id": "9110b811-141a-417f-a333-f029766c459c","creation_time": "2026-02-26T12:03:45Z","name": "Case 2026-02-26 12:03:45"} |
| 2026-02-26T12:04:02.293Z | evidence_intake | {"dissect_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []} |
| 2026-02-26T12:04:02.294Z | image_opened | {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"} |
| 2026-02-26T12:04:08.252Z | parsing_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"} |
| 2026-02-26T12:04:08.376Z | parsing_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv","duration_seconds": 0.124179,"function": "runkeys","record_count": 4} |
| 2026-02-26T12:04:08.376Z | parsing_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"} |
| 2026-02-26T12:04:11.672Z | parsing_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv","duration_seconds": 3.295663,"function": "tasks","record_count": 469} |
| 2026-02-26T12:04:11.672Z | parsing_started | {"artifact_key": "services","artifact_name": "Services","function": "services"} |
| 2026-02-26T12:04:13.647Z | parsing_completed | {"artifact_key": "services","artifact_name": "Services","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv","duration_seconds": 1.975661,"function": "services","record_count": 2332} |
| 2026-02-26T12:04:13.648Z | parsing_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"} |
| 2026-02-26T12:04:13.703Z | parsing_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/cim.csv","duration_seconds": 0.055436,"function": "cim","record_count": 0} |
| 2026-02-26T12:04:13.703Z | parsing_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"} |
| 2026-02-26T12:04:20.771Z | parsing_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv","duration_seconds": 7.068334,"function": "shimcache","record_count": 1390} |
| 2026-02-26T12:04:20.771Z | parsing_started | {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"} |
| 2026-02-26T12:04:21.126Z | parsing_completed | {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv","duration_seconds": 0.355014,"function": "amcache","record_count": 615} |
| 2026-02-26T12:04:21.127Z | parsing_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"} |
| 2026-02-26T12:04:21.150Z | parsing_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv","duration_seconds": 0.023312,"function": "bam","record_count": 101} |
| 2026-02-26T12:04:21.150Z | parsing_started | {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"} |
| 2026-02-26T12:04:21.178Z | parsing_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv","duration_seconds": 0.027911,"function": "userassist","record_count": 101} |
| 2026-02-26T12:04:21.178Z | parsing_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"} |
| 2026-02-26T12:04:21.190Z | parsing_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv","duration_seconds": 0.011627,"function": "recyclebin","record_count": 2} |
| 2026-02-26T12:04:21.190Z | parsing_started | {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"} |
| 2026-02-26T12:04:22.545Z | parsing_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv","duration_seconds": 1.355747,"function": "browser.history","record_count": 60} |
| 2026-02-26T12:04:22.546Z | parsing_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"} |
| 2026-02-26T12:04:23.040Z | parsing_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv","duration_seconds": 0.494389,"function": "browser.downloads","record_count": 4} |
| 2026-02-26T12:04:23.040Z | parsing_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"} |
| 2026-02-26T12:04:23.062Z | parsing_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/activitiescache.csv","duration_seconds": 0.021865,"function": "activitiescache","record_count": 0} |
| 2026-02-26T12:04:23.062Z | parsing_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"} |
| 2026-02-26T12:04:23.930Z | parsing_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.network_data.csv","duration_seconds": 0.868076,"function": "sru.network_data","record_count": 0} |
| 2026-02-26T12:04:23.930Z | parsing_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"} |
| 2026-02-26T12:04:39.037Z | parsing_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv","duration_seconds": 15.106736,"function": "sru.application","record_count": 73965} |
| 2026-02-26T12:04:39.037Z | parsing_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"} |
| 2026-02-26T12:04:39.136Z | parsing_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv","duration_seconds": 0.098833,"function": "shellbags","record_count": 203} |
| 2026-02-26T12:04:39.136Z | parsing_started | {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"} |
| 2026-02-26T12:04:39.211Z | parsing_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv","duration_seconds": 0.074759,"function": "muicache","record_count": 596} |
| 2026-02-26T12:04:39.211Z | parsing_started | {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"} |
| 2026-02-26T12:04:39.216Z | parsing_completed | {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv","duration_seconds": 0.004795,"function": "sam","record_count": 8} |
| 2026-02-26T12:04:39.216Z | parsing_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"} |
| 2026-02-26T12:04:39.226Z | parsing_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/defender.quarantine.csv","duration_seconds": 0.009947,"function": "defender.quarantine","record_count": 0} |
| 2026-02-26T12:04:46.453Z | prompt_submitted | {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."} |
| 2026-02-26T12:04:46.966Z | analysis_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:04:46.971Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/runkeys.csv","artifact_key": "runkeys","projection_columns": ["ts","name","command","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv"} |
| 2026-02-26T12:04:46.971Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/runkeys.csv","annotated_rows": 2,"artifact_key": "runkeys","removed_records": 2,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:05:06.802Z | analysis_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 19.836158,"status": "success","token_count": 393} |
| 2026-02-26T12:05:06.802Z | analysis_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:05:06.819Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/tasks.csv","artifact_key": "tasks","projection_columns": ["task_path","uri","date","user_id","display_name","run_level","arguments","command","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv"} |
| 2026-02-26T12:05:06.819Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/tasks.csv","annotated_rows": 71,"artifact_key": "tasks","removed_records": 123,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv","variant_columns": ["date","arguments"]} |
| 2026-02-26T12:06:19.817Z | analysis_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 73.014988,"status": "success","token_count": 1106} |
| 2026-02-26T12:06:19.824Z | analysis_started | {"artifact_key": "services","artifact_name": "Services","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:06:19.846Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/services.csv","artifact_key": "services","projection_columns": ["ts","name","servicedll","imagepath","imagepath_args","start","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv"} |
| 2026-02-26T12:06:19.846Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/services.csv","annotated_rows": 607,"artifact_key": "services","removed_records": 1725,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:08:45.732Z | analysis_completed | {"artifact_key": "services","artifact_name": "Services","duration_seconds": 145.908078,"status": "success","token_count": 1206} |
| 2026-02-26T12:08:45.733Z | analysis_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:08:45.733Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/cim.csv","annotated_rows": 0,"artifact_key": "cim","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/cim.csv","variant_columns": []} |
| 2026-02-26T12:10:36.818Z | analysis_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 111.085007,"status": "success","token_count": 334} |
| 2026-02-26T12:10:36.818Z | analysis_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:10:36.828Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shimcache.csv","artifact_key": "shimcache","projection_columns": ["last_modified","name","path","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv"} |
| 2026-02-26T12:10:36.828Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shimcache.csv","annotated_rows": 292,"artifact_key": "shimcache","removed_records": 876,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv","variant_columns": ["last_modified"]} |
| 2026-02-26T12:13:11.260Z | analysis_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 154.441672,"status": "success","token_count": 1754} |
| 2026-02-26T12:13:11.269Z | analysis_started | {"artifact_key": "amcache","artifact_name": "Amcache","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:13:11.280Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/amcache.csv","artifact_key": "amcache","projection_columns": ["mtime_regf","path","publisher","version","product_name","size","is_oscomponent","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv"} |
| 2026-02-26T12:13:11.280Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/amcache.csv","annotated_rows": 5,"artifact_key": "amcache","removed_records": 403,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv","variant_columns": ["mtime_regf"]} |
| 2026-02-26T12:14:47.717Z | analysis_completed | {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 96.447378,"status": "success","token_count": 1445} |
| 2026-02-26T12:14:47.725Z | analysis_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:14:47.727Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/bam.csv","artifact_key": "bam","projection_columns": ["ts","path","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv"} |
| 2026-02-26T12:14:47.727Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/bam.csv","annotated_rows": 31,"artifact_key": "bam","removed_records": 69,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:15:35.015Z | analysis_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 47.289834,"status": "success","token_count": 1059} |
| 2026-02-26T12:15:35.016Z | analysis_started | {"artifact_key": "userassist","artifact_name": "UserAssist","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:15:35.018Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/userassist.csv","artifact_key": "userassist","projection_columns": ["ts","path","number_of_executions","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv"} |
| 2026-02-26T12:15:35.018Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/userassist.csv","annotated_rows": 2,"artifact_key": "userassist","removed_records": 2,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:16:32.122Z | analysis_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 57.105818,"status": "success","token_count": 1162} |
| 2026-02-26T12:16:32.123Z | analysis_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:16:32.124Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/recyclebin.csv","artifact_key": "recyclebin","projection_columns": ["ts","path","filesize","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv"} |
| 2026-02-26T12:16:32.124Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/recyclebin.csv","annotated_rows": 0,"artifact_key": "recyclebin","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:16:58.887Z | analysis_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 26.763627,"status": "success","token_count": 732} |
| 2026-02-26T12:16:58.887Z | analysis_started | {"artifact_key": "browser.history","artifact_name": "Browser History","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:16:58.889Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.history.csv","artifact_key": "browser.history","projection_columns": ["ts","browser","url","title","visit_count","from_url","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv"} |
| 2026-02-26T12:16:58.889Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.history.csv","annotated_rows": 9,"artifact_key": "browser.history","removed_records": 10,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv","variant_columns": ["ts"]} |
| 2026-02-26T12:17:58.207Z | analysis_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 59.319968,"status": "success","token_count": 1388} |
| 2026-02-26T12:17:58.208Z | analysis_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:17:58.209Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.downloads.csv","artifact_key": "browser.downloads","projection_columns": ["ts_start","ts_end","browser","path","url","size","state","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv"} |
| 2026-02-26T12:17:58.209Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.downloads.csv","annotated_rows": 0,"artifact_key": "browser.downloads","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv","variant_columns": ["ts_start","ts_end"]} |
| 2026-02-26T12:18:52.370Z | analysis_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 54.161908,"status": "success","token_count": 950} |
| 2026-02-26T12:18:52.370Z | analysis_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:18:52.371Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/activitiescache.csv","annotated_rows": 0,"artifact_key": "activitiescache","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/activitiescache.csv","variant_columns": []} |
| 2026-02-26T12:20:45.445Z | analysis_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 113.074464,"status": "success","token_count": 368} |
| 2026-02-26T12:20:45.445Z | analysis_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:20:45.446Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.network_data.csv","annotated_rows": 0,"artifact_key": "sru.network_data","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.network_data.csv","variant_columns": []} |
| 2026-02-26T12:22:39.590Z | analysis_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 114.144389,"status": "success","token_count": 370} |
| 2026-02-26T12:22:39.590Z | analysis_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:22:40.266Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.application.csv","artifact_key": "sru.application","projection_columns": ["ts","app","user","foreground_cycle_time","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv"} |
| 2026-02-26T12:22:40.266Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.application.csv","annotated_rows": 151,"artifact_key": "sru.application","removed_records": 73734,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv","variant_columns": ["ts","foreground_cycle_time"]} |
| 2026-02-26T12:26:05.261Z | analysis_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 205.670674,"status": "success","token_count": 1306} |
| 2026-02-26T12:26:06.131Z | analysis_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:26:06.133Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shellbags.csv","artifact_key": "shellbags","projection_columns": ["ts_mtime","ts_atime","ts_btime","type","path","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv"} |
| 2026-02-26T12:26:06.133Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shellbags.csv","annotated_rows": 37,"artifact_key": "shellbags","removed_records": 46,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv","variant_columns": ["ts_mtime","ts_atime","ts_btime"]} |
| 2026-02-26T12:28:59.014Z | analysis_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 172.883207,"status": "success","token_count": 1321} |
| 2026-02-26T12:28:59.017Z | analysis_started | {"artifact_key": "muicache","artifact_name": "MUIcache","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:28:59.022Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/muicache.csv","artifact_key": "muicache","projection_columns": ["name","value","path","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv"} |
| 2026-02-26T12:28:59.022Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/muicache.csv","annotated_rows": 0,"artifact_key": "muicache","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv","variant_columns": []} |
| 2026-02-26T12:31:50.738Z | analysis_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 171.721687,"status": "success","token_count": 521} |
| 2026-02-26T12:31:50.739Z | analysis_started | {"artifact_key": "sam","artifact_name": "SAM Users","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:31:50.739Z | artifact_ai_projection | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sam.csv","artifact_key": "sam","projection_columns": ["ts","rid","fullname","username","admincomment","lastlogin","lastpasswordset","lastincorrectlogin","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv"} |
| 2026-02-26T12:31:50.739Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sam.csv","annotated_rows": 4,"artifact_key": "sam","removed_records": 4,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv","variant_columns": ["ts","lastlogin","lastpasswordset","lastincorrectlogin"]} |
| 2026-02-26T12:34:10.300Z | analysis_completed | {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 139.561392,"status": "success","token_count": 380} |
| 2026-02-26T12:34:10.300Z | analysis_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:34:10.301Z | artifact_deduplicated | {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/defender.quarantine.csv","annotated_rows": 0,"artifact_key": "defender.quarantine","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/defender.quarantine.csv","variant_columns": []} |
| 2026-02-26T12:37:42.014Z | analysis_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 211.713937,"status": "success","token_count": 304} |
| 2026-02-26T12:37:42.015Z | analysis_started | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "gpt-oss:120b","provider": "local"} |
| 2026-02-26T12:39:28.294Z | analysis_completed | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 106.278767,"status": "success","token_count": 2816} |
| 2026-02-26T12:44:14.866Z | hash_verification | {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01"} |