[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged