low closed false positive

๐Ÿท๏ธ Analyst Verdict Classification

FP by analyst

๐Ÿค– AI Analysis

๐Ÿ”” Detections (1)

Change PowerShell Policies to an Insecure Level low
Rule: service.windows_process_creation/proc_creation_win_powershell_set_policies_to_unsecure_level
Hostname: desktop-atsepsk ยท Sensor: 8f3a47be-5629-4c...
Event Type: NEW_PROCESS
Confidence: 94% ยท Verdict: false positive
Event Data:
COMMAND_LINE:
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass Remove-Item -Force 'C:\Program Files (x86)\Google\Chrome Remote Desktop\146.0.7680.5\*.log'
FILE_IS_SIGNED:
1
FILE_PATH:
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
HASH:
3bfedaaa40d9e19e45a3ee10c0f14b1750b01619ebb9f39be3865bcfdacdd2e5
PARENT:
{'BASE_ADDRESS': 14942208, 'COMMAND_LINE': 'C:\\Windows\\syswow64\\MsiExec.exe -Embedding 57917046E265CB85396AB79820287388 E Global\\MSI0000', 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\Windows\\syswow64\\MsiExec.exe', 'HASH': '34e2e75cb8622809e4f95b3e665071d755870f503167268f23d0110cc5f7ee2c', 'MEMORY_USAGE': 13615104, 'PARENT_ATOM': '23a7a08840c587c857088e4669c19e54', 'PARENT_PROCESS_ID': 26224, 'PROCESS_ID': 32732, 'THIS_ATOM': '0077d031151f6ea2ed35db9269c19e54', 'THREADS': 7, 'TIMESTAMP': 1774296660033, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}
PARENT_PROCESS_ID:
32732
PROCESS_ID:
5944
IOCs: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\MsiExec.exe 3bfedaaa40d9e19e45a3ee10c0f14b1750b01619ebb9f39be3865bcfdacdd2e5
MITRE: T1059.001 T1218.007
Analyst Declaration:
๐Ÿ“„ Raw Detection JSON
{
  "author": "_ext-sigma-7a14fbc3-54d9-4b4d-8700-61eddada04f0[bulk][segment]",
  "cat": "Change PowerShell Policies to an Insecure Level",
  "detect": {
    "event": {
      "COMMAND_LINE": "\"C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe\" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass Remove-Item -Force \u0027C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\146.0.7680.5\\*.log\u0027",
      "FILE_IS_SIGNED": 1,
      "FILE_PATH": "C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe",
      "HASH": "3bfedaaa40d9e19e45a3ee10c0f14b1750b01619ebb9f39be3865bcfdacdd2e5",
      "PARENT": {
        "BASE_ADDRESS": 14942208,
        "COMMAND_LINE": "C:\\Windows\\syswow64\\MsiExec.exe -Embedding 57917046E265CB85396AB79820287388 E Global\\MSI0000",
        "FILE_IS_SIGNED": 1,
        "FILE_PATH": "C:\\Windows\\syswow64\\MsiExec.exe",
        "HASH": "34e2e75cb8622809e4f95b3e665071d755870f503167268f23d0110cc5f7ee2c",
        "MEMORY_USAGE": 13615104,
        "PARENT_ATOM": "23a7a08840c587c857088e4669c19e54",
        "PARENT_PROCESS_ID": 26224,
        "PROCESS_ID": 32732,
        "THIS_ATOM": "0077d031151f6ea2ed35db9269c19e54",
        "THREADS": 7,
        "TIMESTAMP": 1774296660033,
        "USER_NAME": "NT AUTHORITY\\SYSTEM"
      },
      "PARENT_PROCESS_ID": 32732,
      "PROCESS_ID": 5944
    },
    "routing": {
      "arch": 2,
      "did": "",
      "event_id": "11c66d4f-1f77-410e-8695-a7b9a0006a54",
      "event_time": 1774296669416,
      "event_type": "NEW_PROCESS",
      "ext_ip": "23.128.32.10",
      "hostname": "desktop-atsepsk",
      "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
      "int_ip": "192.168.50.200",
      "latency": 117,
      "moduleid": 2,
      "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
      "parent": "0077d031151f6ea2ed35db9269c19e54",
      "plat": 268435456,
      "sid": "8f3a47be-5629-4c66-921d-17c39ed07e87",
      "tags": [
        "fusion-soc-alert",
        "fusion-soc-case",
        "fusion-soc-pulled",
        "fusion-soc-triage",
        "fusionsoc-critical",
        "fusionsoc-high",
        "fusionsoc-investigated",
        "joys",
        "windows",
        "yara_detection_memory",
        "yara_detection_disk"
      ],
      "this": "835af718162d05ef712113f669c19e5e"
    }
  },
  "detect_id": "fc571d8d-e9dd-4b08-9986-7a7f69c19e5d",
  "detect_mtd": {
    "author": "frack113",
    "description": "Detects changing the PowerShell script execution policy to a potentially insecure level using the \"-ExecutionPolicy\" flag.",
    "falsepositives": [
      "Administrator scripts"
    ],
    "level": "medium",
    "references": [
      "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.4",
      "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-7.4",
      "https://adsecurity.org/?p=2604",
      "https://thedfirreport.com/2021/11/01/from-zero-to-domain-admin/"
    ],
    "tags": [
      "attack.execution",
      "attack.t1059.001"
    ]
  },
  "gen_time": 1774296669543,
  "link": "https://app.limacharlie.io/orgs/d3541070-8b0e-4663-8a6a-aa0727aacd36/sensors/8f3a47be-5629-4c66-921d-17c39ed07e87/timeline?time=1774296669\u0026selected=835af718162d05ef712113f669c19e5e",
  "namespace": "general",
  "routing": {
    "arch": 2,
    "did": "",
    "event_id": "11c66d4f-1f77-410e-8695-a7b9a0006a54",
    "event_time": 1774296669416,
    "event_type": "NEW_PROCESS",
    "ext_ip": "23.128.32.10",
    "hostname": "desktop-atsepsk",
    "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
    "int_ip": "192.168.50.200",
    "latency": 117,
    "moduleid": 2,
    "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
    "parent": "0077d031151f6ea2ed35db9269c19e54",
    "plat": 268435456,
    "sid": "8f3a47be-5629-4c66-921d-17c39ed07e87",
    "tags": [
      "fusion-soc-alert",
      "fusion-soc-case",
      "fusion-soc-pulled",
      "fusion-soc-triage",
      "fusionsoc-critical",
      "fusionsoc-high",
      "fusionsoc-investigated",
      "joys",
      "windows",
      "yara_detection_memory",
      "yara_detection_disk"
    ],
    "this": "835af718162d05ef712113f669c19e5e"
  },
  "rule_tags": [
    "attack.execution",
    "attack.t1059.001",
    "ext:ext-sigma"
  ],
  "source": "d3541070-8b0e-4663-8a6a-aa0727aacd36.b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175.8f3a47be-5629-4c66-921d-17c39ed07e87.10000000.2",
  "source_rule": "service.windows_process_creation/proc_creation_win_powershell_set_policies_to_unsecure_level",
  "ts": 1774296669000
}
๐ŸŒ Threat Intel JSON
{
  "virustotal": {
    "malicious": false,
    "provider": "virustotal",
    "reputation": 0,
    "stats": {
      "confirmed-timeout": 0,
      "failure": 0,
      "harmless": 0,
      "malicious": 0,
      "suspicious": 0,
      "timeout": 11,
      "type-unsupported": 4,
      "undetected": 61
    }
  }
}
๐Ÿค– Triage JSON
{
  "confidence": 0.943,
  "false_positive_reason": "Software installation or update process (MsiExec) using PowerShell for cleanup.",
  "investigation_questions": [
    "Was there a recent installation or update of Chrome Remote Desktop on this host?"
  ],
  "ioc_analysis": "The binaries involved (powershell.exe and MsiExec.exe) are both signed by Microsoft and located in their respective standard system directories (SysWOW64). The hash of the PowerShell binary is known-good. The command line\u0027s use of \u0027-ExecutionPolicy Bypass\u0027 is common in installer scripts to ensure successful execution regardless of the local policy.",
  "iocs_extracted": [
    "C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe",
    "C:\\Windows\\syswow64\\MsiExec.exe",
    "3bfedaaa40d9e19e45a3ee10c0f14b1750b01619ebb9f39be3865bcfdacdd2e5"
  ],
  "mitre_techniques": [
    "T1059.001",
    "T1218.007"
  ],
  "recommended_actions": [
    "Close case as false positive (unanimous AI verdict)",
    "Whitelist PowerShell executions by MsiExec.exe that specifically target Chrome Remote Desktop log cleanup if the rule continues to generate noise.",
    "No immediate remediation required on the host."
  ],
  "risk_score": 8,
  "severity": "low",
  "summary": "**Vote: UNANIMOUS (3/3 -\u003e FALSE POSITIVE)**\n\n### \u264a gemini-cli Analysis (Primary)\n**Verdict:** false_positive | **Confidence:** 0.98\nThis detection is a false positive triggered by a legitimate PowerShell cleanup script executed by the Windows Installer (MsiExec.exe). The script is deleting log files in the \u0027C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\u0027 directory, which is standard behavior during a software installation or update process.\n\n**IOC Analysis:** The binaries involved (powershell.exe and MsiExec.exe) are both signed by Microsoft and located in their respective standard system directories (SysWOW64). The hash of the PowerShell binary is known-good. The command line\u0027s use of \u0027-ExecutionPolicy Bypass\u0027 is common in installer scripts to ensure successful execution regardless of the local policy.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** false_positive | **Confidence:** 0.95\nThis event is a false positive because the process is running from its expected location and is signed by Microsoft. The command line shows a legitimate removal of Chrome Remote Desktop logs, which is consistent with administrative maintenance tasks.\n\n**IOC Analysis:** The PowerShell executable is located at C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe, which is the expected location for this binary. The process is signed (FILE_IS_SIGNED: 1) and has a known Microsoft hash. The command removes log files from Chrome Remote Desktop, which is a common administrative task.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** false_positive | **Confidence:** 0.9\nThe PowerShell process is legitimate and running from a trusted directory, with a valid Microsoft signature. The command deletes log files from a legitimate application directory, likely part of routine cleanup, and is spawned by a trusted process, indicating a false positive.\n\n**IOC Analysis:** The FILE_PATH C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe is a known-good Microsoft binary in the expected directory. The HASH is signed by Microsoft, confirming legitimacy. The COMMAND_LINE involves deleting log files from Google Chrome Remote Desktop, which is a common benign operation for cleanup. The PARENT_PROCESS is MsiExec.exe, a legitimate installer, further supporting benign activity.",
  "verdict": "false_positive",
  "voting": {
    "auto_action": "auto_close_fp",
    "mode": "unanimous",
    "total_models": 3,
    "vote_summary": [
      "gemini-cli: false_positive (low, 98% confidence)",
      "qwen3.5:4b: false_positive (low, 95% confidence)",
      "deepseek-r1:8b: false_positive (low, 90% confidence)"
    ],
    "votes": [
      {
        "confidence": 0.98,
        "model": "gemini-cli",
        "verdict": "false_positive"
      },
      {
        "confidence": 0.95,
        "model": "qwen3.5:4b",
        "verdict": "false_positive"
      },
      {
        "confidence": 0.9,
        "model": "deepseek-r1:8b",
        "verdict": "false_positive"
      }
    ],
    "winning_count": 3,
    "winning_verdict": "false_positive"
  }
}

โš™๏ธ Response Actions

Action Target Status Result
tag 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated executed Tag applied
recommended Close case as false positive (unanimous AI verdict) executed General Activity Sweep: 0 events found
recommended Whitelist PowerShell executions by MsiExec.exe that specifically target Chrome Remote Desktop log cleanup if the rule continues to generate noise. executed General Activity Sweep: 0 events found
recommended No immediate remediation required on the host. executed General Activity Sweep: 0 events found

๐Ÿ“ Add Note

๐Ÿ’ฌ Notes (4)

๐Ÿค– FusionSOC AI 2026-03-24T13:58
๐Ÿค– FusionSOC AI 2026-03-24T13:58
๐Ÿค– FusionSOC AI 2026-03-24T13:58
๐Ÿค– FusionSOC AI 2026-03-24T13:58

๐Ÿ“œ Timeline

2026-03-24T13:59:07
analyst
Status changed: investigating โ†’ closed
2026-03-24T13:59:05
analyst
Analyst classified as False Positive (FP)
2026-03-24T13:58:50
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T13:58:50
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T13:58:50
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** No immediate remediation required on the host. **Sensor:** `8f3a47be-5629-4c...`...
2026-03-24T13:58:50
FusionSOC
Response action queued: recommended on No immediate remediation required on the host.
2026-03-24T13:58:50
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T13:58:50
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T13:58:50
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Whitelist PowerShell executions by MsiExec.exe that specifically target Chrome R...
2026-03-24T13:58:50
FusionSOC
Response action queued: recommended on Whitelist PowerShell executions by MsiExec.exe that specifically target Chrome Remote Desktop log cleanup if the rule continues to generate noise.
2026-03-24T13:58:50
FusionSOC AI
Status changed: open โ†’ investigating
2026-03-24T13:58:50
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T13:58:50
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Close case as false positive (unanimous AI verdict) **Sensor:** `8f3a47be-5629-4...
2026-03-24T13:58:50
FusionSOC
Response action queued: recommended on Close case as false positive (unanimous AI verdict)
2026-03-24T13:58:50
FusionSOC
Action tag โ†’ executed: Tag applied
2026-03-24T13:58:50
FusionSOC
Response action queued: tag on 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated
2026-03-24T13:58:49
FusionSOC AI
Detection fc571d8d-e9dd-4b08-9986-7a7f69c19e5d triaged as false_positive (low severity, confidence: 94%)
2026-03-24T13:58:49
FusionSOC AI
Case created from detection: service.windows_process_creation/proc_creation_win_powershell_set_policies_to_unsecure_level