MEDIUM PowerShell runs with known Mimikatz arguments

Detected ID: #37080 | Detected: 2026-01-17 00:44:05 | Collection
Alert Overview

Process action type = execution AND target process cmd = *privilege::*, *sekurlsa::*, *kerberos::*, *crypto::*, *vault::*, *token::*, *lsadump::*, *-dumpcr*, *-dumpce* AND target process name = powershell.exe

Unclassified
XDR BIOC
New
DS:PANW/XDR Agent DOM:Security
Host Information
BOOK-R0BE6S1NC3
BOOK-R0BE6S1NC3\ubuntu
-
Process Information Process Execution
Actor Process (Executor)
Process Name UltimateXdrGenerator.exe
Path C:\app\cortex-xdr-siem-test\xdr_tools\UltimateXdrGenerator\bin\publish\UltimateXdrGenerator.exe
PID 69852
SHA256 39d630bf97d4f13b0d505838e4271408ba66362564adcb4384056f00325823bc VT
MD5 d88d511736399b982710f6df2a155d43
"C:\app\cortex-xdr-siem-test\xdr_tools\UltimateXdrGenerator\bin\publish\UltimateXdrGenerator.exe"  --once --scenarios 20 
Action Process (Target)
Process Name powershell.exe
SHA256 0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46 VT
Signature Microsoft Corporation Signed
"powershell.exe" -c lsadump::dcsync
Parent Process (Causality)
Process Name cmd.exe
Path C:\Windows\System32\cmd.exe
SHA256 64afc6db3aad1289533662e2d79e27dd55c7dcdb8cd918b08e145ad82ad5acb4 VT
MD5 6d109a3a00f210c1ab89c3b08399ed48
C:\windows\SYSTEM32\cmd.exe /c ""C:\app\cortex-xdr-siem-test\xdr_ultimate_runner.bat""
Severity Analysis
MEDIUM

Review and assess impact

Summary
Events 1
IP Addresses 3
Tags 2
File Artifacts Yes
Network Artifacts No
Registry Artifacts No
Analyst Verdict