low closed false positive

๐Ÿท๏ธ Analyst Verdict Classification

FP by analyst

๐Ÿค– AI Analysis

๐Ÿ”” Detections (1)

YARA Detection on Disk - Macos_Infostealer_Wallets_8e469ea0 low
Rule: general.YARA Detection on Disk
Hostname: desktop-atsepsk ยท Sensor: 8f3a47be-5629-4c...
Event Type: YARA_DETECTION
Confidence: 92% ยท Verdict: false positive
Event Data:
FILE_PATH:
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\145.0.3800.97\msedge.dll
RULE_NAME:
Macos_Infostealer_Wallets_8e469ea0
IOCs: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\145.0.3800.97\msedge.dll Rule: Macos_Infostealer_Wallets_8e469ea0
Analyst Declaration:
๐Ÿ“„ Raw Detection JSON
{
  "author": "ckeller@fusioncybersecurity.us",
  "cat": "YARA Detection on Disk - Macos_Infostealer_Wallets_8e469ea0",
  "detect": {
    "event": {
      "FILE_PATH": "C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\145.0.3800.97\\msedge.dll",
      "RULE_NAME": "Macos_Infostealer_Wallets_8e469ea0"
    },
    "routing": {
      "arch": 2,
      "did": "",
      "event_id": "75567534-a248-4bfa-a0fd-c8ecf0c4b7f4",
      "event_time": 1774295551305,
      "event_type": "YARA_DETECTION",
      "ext_ip": "23.128.32.10",
      "hostname": "desktop-atsepsk",
      "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
      "int_ip": "192.168.50.200",
      "latency": -771,
      "moduleid": 2,
      "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
      "plat": 268435456,
      "sid": "8f3a47be-5629-4c66-921d-17c39ed07e87",
      "tags": [
        "fusion-soc-alert",
        "fusion-soc-case",
        "fusion-soc-pulled",
        "fusion-soc-triage",
        "fusionsoc-critical",
        "fusionsoc-high",
        "fusionsoc-investigated",
        "joys",
        "windows",
        "yara_detection_memory"
      ],
      "this": "a2289de8c13d48d60eccded169c199ff"
    }
  },
  "detect_id": "92a95d6e-a51a-47ac-97bf-461269c199fe",
  "gen_time": 1774295550533,
  "link": "https://app.limacharlie.io/orgs/d3541070-8b0e-4663-8a6a-aa0727aacd36/sensors/8f3a47be-5629-4c66-921d-17c39ed07e87/timeline?time=1774295551\u0026selected=a2289de8c13d48d60eccded169c199ff",
  "namespace": "general",
  "routing": {
    "arch": 2,
    "did": "",
    "event_id": "75567534-a248-4bfa-a0fd-c8ecf0c4b7f4",
    "event_time": 1774295551305,
    "event_type": "YARA_DETECTION",
    "ext_ip": "23.128.32.10",
    "hostname": "desktop-atsepsk",
    "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
    "int_ip": "192.168.50.200",
    "latency": -771,
    "moduleid": 2,
    "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
    "plat": 268435456,
    "sid": "8f3a47be-5629-4c66-921d-17c39ed07e87",
    "tags": [
      "fusion-soc-alert",
      "fusion-soc-case",
      "fusion-soc-pulled",
      "fusion-soc-triage",
      "fusionsoc-critical",
      "fusionsoc-high",
      "fusionsoc-investigated",
      "joys",
      "windows",
      "yara_detection_memory"
    ],
    "this": "a2289de8c13d48d60eccded169c199ff"
  },
  "source": "d3541070-8b0e-4663-8a6a-aa0727aacd36.b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175.8f3a47be-5629-4c66-921d-17c39ed07e87.10000000.2",
  "source_rule": "general.YARA Detection on Disk",
  "ts": 1774295550000
}
๐Ÿค– Triage JSON
{
  "confidence": 0.925,
  "false_positive_reason": "The file is a legitimate Microsoft Edge WebView2 component located in its expected Program Files directory, and the YARA rule appears to be incorrectly flagging standard Windows system binaries.",
  "investigation_questions": [
    "Has this detection occurred before on other hosts?",
    "Is there a recent update or deployment of Microsoft Edge WebView2?"
  ],
  "ioc_analysis": "The file path C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\145.0.3800.97\\msedge.dll is a standard location for Microsoft Edge WebView2 components. The process tree shows no suspicious parent processes or command line arguments, and the file resides in an expected directory structure for legitimate software.",
  "iocs_extracted": [
    "C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\145.0.3800.97\\msedge.dll",
    "Rule: Macos_Infostealer_Wallets_8e469ea0"
  ],
  "mitre_techniques": [],
  "recommended_actions": [
    "Close case as false positive (unanimous AI verdict)",
    "Verify the file hash against Microsoft\u0027s official repository",
    "Check if the YARA rule signature matches known legitimate Edge binaries",
    "Review rule configuration to ensure it does not flag standard Windows system files"
  ],
  "risk_score": 10,
  "severity": "low",
  "summary": "**Vote: UNANIMOUS (2/2 -\u003e FALSE POSITIVE)**\n\n### \u264a gemini-cli Analysis (Primary)\nFailed or timed out.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detection flags a legitimate Microsoft Edge WebView2 DLL file located in its expected Program Files directory. The YARA rule appears to be misconfigured or targeting incorrect signatures for this known-good Windows component.\n\n**IOC Analysis:** The file path C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\145.0.3800.97\\msedge.dll is a standard location for Microsoft Edge WebView2 components. The process tree shows no suspicious parent processes or command line arguments, and the file resides in an expected directory structure for legitimate software.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** false_positive | **Confidence:** 0.9\nThe detection is likely a false positive as the file path corresponds to a legitimate Microsoft Edge WebView component, which is expected to be located in this directory. Historical analyst feedback confirms false positives for this rule.\n\n**IOC Analysis:** The IOC FILE_PATH is located in C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\, which is a known legitimate directory for Microsoft Edge components. No malicious indicators like hashes or signatures were provided, and the rule has a history of false positives.",
  "verdict": "false_positive",
  "voting": {
    "auto_action": "auto_close_fp",
    "mode": "unanimous",
    "total_models": 2,
    "vote_summary": [
      "qwen3.5:4b: false_positive (low, 95% confidence)",
      "deepseek-r1:8b: false_positive (low, 90% confidence)"
    ],
    "votes": [
      {
        "confidence": 0.95,
        "model": "qwen3.5:4b",
        "verdict": "false_positive"
      },
      {
        "confidence": 0.9,
        "model": "deepseek-r1:8b",
        "verdict": "false_positive"
      }
    ],
    "winning_count": 2,
    "winning_verdict": "false_positive"
  }
}

โš™๏ธ Response Actions

Action Target Status Result
tag 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated executed Tag applied
recommended Close case as false positive (unanimous AI verdict) executed General Activity Sweep: 0 events found
recommended Whitelist the YARA rule Macos_Infostealer_Wallets_8e469ea0 for Windows-based sensors. executed General Activity Sweep: 0 events found
recommended No further action required for this host. executed General Activity Sweep: 0 events found
tag 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated executed Tag applied
recommended Close case as false positive (unanimous AI verdict) executed General Activity Sweep: 0 events found
recommended Verify the file hash against Microsoft's official repository executed File Activity Investigation: 0 events found
recommended Check if the YARA rule signature matches known legitimate Edge binaries executed General Activity Sweep: 0 events found
recommended Review rule configuration to ensure it does not flag standard Windows system files executed File Activity Investigation: 0 events found

๐Ÿ“ Add Note

๐Ÿ’ฌ Notes (8)

๐Ÿค– FusionSOC AI 2026-03-24T14:23
๐Ÿค– FusionSOC AI 2026-03-24T14:23
๐Ÿค– FusionSOC AI 2026-03-24T14:23
๐Ÿค– FusionSOC AI 2026-03-24T14:23
๐Ÿค– FusionSOC AI 2026-03-24T14:20
๐Ÿค– FusionSOC AI 2026-03-24T14:20
๐Ÿค– FusionSOC AI 2026-03-24T14:20
๐Ÿค– FusionSOC AI 2026-03-24T14:20

๐Ÿ“œ Timeline

2026-03-24T15:05:54
analyst
Status changed: investigating โ†’ closed
2026-03-24T15:05:51
analyst
Analyst classified as False Positive (FP)
2026-03-24T14:23:27
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:23:27
FusionSOC
Action recommended โ†’ executed: File Activity Investigation: 0 events found
2026-03-24T14:23:27
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” File Activity Investigation **Action:** Review rule configuration to ensure it does not flag standard Windows syste...
2026-03-24T14:23:27
FusionSOC
Response action queued: recommended on Review rule configuration to ensure it does not flag standard Windows system files
2026-03-24T14:23:27
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:23:27
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T14:23:27
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Check if the YARA rule signature matches known legitimate Edge binaries **Sensor...
2026-03-24T14:23:27
FusionSOC
Response action queued: recommended on Check if the YARA rule signature matches known legitimate Edge binaries
2026-03-24T14:23:27
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:23:27
FusionSOC
Action recommended โ†’ executed: File Activity Investigation: 0 events found
2026-03-24T14:23:27
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” File Activity Investigation **Action:** Verify the file hash against Microsoft's official repository **Sensor:** `8...
2026-03-24T14:23:25
FusionSOC
Response action queued: recommended on Verify the file hash against Microsoft's official repository
2026-03-24T14:23:25
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:23:25
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T14:23:25
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Close case as false positive (unanimous AI verdict) **Sensor:** `8f3a47be-5629-4...
2026-03-24T14:23:25
FusionSOC
Response action queued: recommended on Close case as false positive (unanimous AI verdict)
2026-03-24T14:23:25
FusionSOC
Action tag โ†’ executed: Tag applied
2026-03-24T14:23:25
FusionSOC
Response action queued: tag on 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated
2026-03-24T14:20:10
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:20:10
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T14:20:10
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** No further action required for this host. **Sensor:** `8f3a47be-5629-4c...` **Ti...
2026-03-24T14:20:10
FusionSOC
Response action queued: recommended on No further action required for this host.
2026-03-24T14:20:10
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T14:20:10
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T14:20:10
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Whitelist the YARA rule Macos_Infostealer_Wallets_8e469ea0 for Windows-based sen...
2026-03-24T14:20:10
FusionSOC
Response action queued: recommended on Whitelist the YARA rule Macos_Infostealer_Wallets_8e469ea0 for Windows-based sensors.
2026-03-24T14:20:10
FusionSOC AI
Status changed: open โ†’ investigating
2026-03-24T14:20:10
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T14:20:10
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Close case as false positive (unanimous AI verdict) **Sensor:** `8f3a47be-5629-4...
2026-03-24T14:20:10
FusionSOC
Response action queued: recommended on Close case as false positive (unanimous AI verdict)
2026-03-24T14:20:10
FusionSOC
Action tag โ†’ executed: Tag applied
2026-03-24T14:20:10
FusionSOC
Response action queued: tag on 8f3a47be-5629-4c66-921d-17c39ed07e87:fusionsoc-investigated
2026-03-24T14:20:09
FusionSOC AI
Detection 92a95d6e-a51a-47ac-97bf-461269c199fe triaged as false_positive (low severity, confidence: 94%)
2026-03-24T14:20:09
FusionSOC AI
Case created from detection: general.YARA Detection on Disk