high closed suspicious

๐Ÿท๏ธ Analyst Verdict Classification

FP by analyst

๐Ÿค– AI Analysis

๐Ÿ”” Detections (1)

00023-WIN-PS_Invoke_Expression_Usage high
Rule: service.WIN-PS_Invoke_Expression_Usage
Hostname: df-labsdc01.dflabs.local ยท Sensor: e4a1c62d-4d1f-44...
Event Type: NEW_PROCESS
Confidence: 82% ยท Verdict: suspicious
Event Data:
BASE_ADDRESS:
140694944940032
COMMAND_LINE:
PowerShell.exe Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1567.003 -CheckPrereqs ; Invoke-AtomicTest T1567.003 -GetPrereqs ; Invoke-AtomicTest T1567.003
FILE_IS_SIGNED:
1
FILE_PATH:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
HASH:
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
MEMORY_USAGE:
143122432
PARENT:
{'BASE_ADDRESS': 140698856259584, 'COMMAND_LINE': 'cmd.exe /C C:\\Windows\\TEMP\\pld368E.tmp.bat T1567.003 ', 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\Windows\\System32\\cmd.exe', 'HASH': '3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2', 'MEMORY_USAGE': 4661248, 'PARENT_ATOM': 'd2b1ecad7af81b32ac16ae0d69c2a7fe', 'PARENT_PROCESS_ID': 3496, 'PROCESS_ID': 7640, 'THIS_ATOM': '45e4e3418a6f8c858f274b1569c2a828', 'THREADS': 3, 'TIMESTAMP': 1774364711483, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}
PARENT_PROCESS_ID:
7640
PROCESS_ID:
3268
THREADS:
33
USER_NAME:
NT AUTHORITY\SYSTEM
IOCs: IEX(IWR 'https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing) Set-MpPreference -DisableRealtimeMonitoring $true Invoke-AtomicTest T1567.003
MITRE: T1567.003 (PowerShell Download and Execute) T1562.004 (Exploit Public-Facing Application) T1561.001 (Abuse Elevation Control)
Analyst Declaration:
๐Ÿ“„ Raw Detection JSON
{
  "author": "_soteria-rules-edr-926e2197-189b-4d89-9675-c8993933dc9a[bulk][segment]",
  "cat": "00023-WIN-PS_Invoke_Expression_Usage",
  "detect": {
    "event": {
      "BASE_ADDRESS": 140694944940032,
      "COMMAND_LINE": "PowerShell.exe  Set-ExecutionPolicy Unrestricted ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force; Set-MpPreference -DisableRealtimeMonitoring $true ; IEX (IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing) ; Install-AtomicRedTeam -Force -getAtomics; Invoke-AtomicTest T1567.003 -CheckPrereqs ; Invoke-AtomicTest T1567.003 -GetPrereqs ; Invoke-AtomicTest T1567.003 ",
      "FILE_IS_SIGNED": 1,
      "FILE_PATH": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
      "HASH": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
      "MEMORY_USAGE": 143122432,
      "PARENT": {
        "BASE_ADDRESS": 140698856259584,
        "COMMAND_LINE": "cmd.exe /C C:\\Windows\\TEMP\\pld368E.tmp.bat T1567.003 ",
        "FILE_IS_SIGNED": 1,
        "FILE_PATH": "C:\\Windows\\System32\\cmd.exe",
        "HASH": "3656f37a1c6951ec4496fabb8ee957d3a6e3c276d5a3785476b482c9c0d32ea2",
        "MEMORY_USAGE": 4661248,
        "PARENT_ATOM": "d2b1ecad7af81b32ac16ae0d69c2a7fe",
        "PARENT_PROCESS_ID": 3496,
        "PROCESS_ID": 7640,
        "THIS_ATOM": "45e4e3418a6f8c858f274b1569c2a828",
        "THREADS": 3,
        "TIMESTAMP": 1774364711483,
        "USER_NAME": "NT AUTHORITY\\SYSTEM"
      },
      "PARENT_PROCESS_ID": 7640,
      "PROCESS_ID": 3268,
      "THREADS": 33,
      "USER_NAME": "NT AUTHORITY\\SYSTEM"
    },
    "routing": {
      "arch": 2,
      "did": "",
      "event_id": "db1e086f-3311-40f1-a0bf-1eded3473d79",
      "event_time": 1774364713278,
      "event_type": "NEW_PROCESS",
      "ext_ip": "67.60.122.240",
      "hostname": "df-labsdc01.dflabs.local",
      "iid": "47501359-645e-4049-906e-e6195da7afcf",
      "int_ip": "192.168.45.129",
      "latency": 3047,
      "moduleid": 2,
      "oid": "ad19afae-3759-4207-b06e-8648b225c455",
      "parent": "45e4e3418a6f8c858f274b1569c2a828",
      "plat": 268435456,
      "sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
      "tags": [
        "domain-controller",
        "fusion-soc-alert",
        "fusion-soc-case",
        "fusion-soc-pulled",
        "fusion-soc-triage"
      ],
      "this": "59a8d473d7fb33057005984369c2a82b"
    }
  },
  "detect_id": "76a6e108-afc5-4382-aed3-276869c2a82c",
  "detect_mtd": {
    "description": "Invoke-Expression is a Powershell commandlet that evaluates and executes a string as a command. Adversaries and frameworks such as Empire use this technique to pull encoded implants from websites as strings and execute them. This detector looks for the use of Invoke-Expression in the commandline of a Powershell process.",
    "falsepositives": [
      "Invoke-Expression used in combination with NuGet, Chef, Puppet, or other administrator like functions is all normal behavior."
    ],
    "references": [
      "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-expression?view=powershell-6",
      "https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf",
      "https://www.fireeye.com/content/dam/fireeye-www/global/en/solutions/pdfs/wp-lazanciyan-investigating-powershell-attacks.pdf",
      "https://isc.sans.edu/diary/Malicious+Powershell+Script+Dissection/24282"
    ],
    "tags": [
      "attack.t1059.001"
    ]
  },
  "gen_time": 1774364716327,
  "link": "https://app.limacharlie.io/orgs/ad19afae-3759-4207-b06e-8648b225c455/sensors/e4a1c62d-4d1f-4472-bae4-43291246b4d4/timeline?time=1774364713\u0026selected=59a8d473d7fb33057005984369c2a82b",
  "namespace": "general",
  "priority": 2,
  "routing": {
    "arch": 2,
    "did": "",
    "event_id": "db1e086f-3311-40f1-a0bf-1eded3473d79",
    "event_time": 1774364713278,
    "event_type": "NEW_PROCESS",
    "ext_ip": "67.60.122.240",
    "hostname": "df-labsdc01.dflabs.local",
    "iid": "47501359-645e-4049-906e-e6195da7afcf",
    "int_ip": "192.168.45.129",
    "latency": 3047,
    "moduleid": 2,
    "oid": "ad19afae-3759-4207-b06e-8648b225c455",
    "parent": "45e4e3418a6f8c858f274b1569c2a828",
    "plat": 268435456,
    "sid": "e4a1c62d-4d1f-4472-bae4-43291246b4d4",
    "tags": [
      "domain-controller",
      "fusion-soc-alert",
      "fusion-soc-case",
      "fusion-soc-pulled",
      "fusion-soc-triage"
    ],
    "this": "59a8d473d7fb33057005984369c2a82b"
  },
  "rule_tags": [
    "ext:soteria-rules-edr",
    "attack.t1059.001"
  ],
  "source": "ad19afae-3759-4207-b06e-8648b225c455.47501359-645e-4049-906e-e6195da7afcf.e4a1c62d-4d1f-4472-bae4-43291246b4d4.10000000.2",
  "source_rule": "service.WIN-PS_Invoke_Expression_Usage",
  "ts": 1774364716000
}
๐ŸŒ Threat Intel JSON
{
  "virustotal": {
    "malicious": false,
    "provider": "virustotal",
    "reputation": 73,
    "stats": {
      "confirmed-timeout": 0,
      "failure": 0,
      "harmless": 0,
      "malicious": 0,
      "suspicious": 0,
      "timeout": 0,
      "type-unsupported": 4,
      "undetected": 72
    }
  }
}
๐Ÿค– Triage JSON
{
  "confidence": 0.825,
  "false_positive_reason": null,
  "investigation_questions": [
    "What user account was originally running this process before it escalated to SYSTEM?",
    "Were there any prior attempts to download the Atomic Red Team framework from external sources?",
    "Is there evidence of lateral movement or data exfiltration following this execution?"
  ],
  "ioc_analysis": "The command line contains multiple high-risk indicators: IEX (Invoke-Expression) fetching code from an external source, disabling Microsoft Defender real-time protection, and executing Atomic Red Team modules. While the process path is legitimate (System32), the specific commands executed are not standard administrative tasks but rather offensive security testing payloads.",
  "iocs_extracted": [
    "IEX(IWR \u0027https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1\u0027 -UseBasicParsing)",
    "Set-MpPreference -DisableRealtimeMonitoring $true",
    "Invoke-AtomicTest T1567.003"
  ],
  "mitre_techniques": [
    "T1567.003 (PowerShell Download and Execute)",
    "T1562.004 (Exploit Public-Facing Application)",
    "T1561.001 (Abuse Elevation Control)"
  ],
  "recommended_actions": [
    "Manual analyst review required \u2014 AI models (split)",
    "Isolate the host immediately to prevent lateral movement",
    "Block outbound traffic to raw.githubusercontent.com at the network perimeter",
    "Review all PowerShell execution policies and restore restricted settings",
    "Check for persistence mechanisms in startup folders or registry keys"
  ],
  "risk_score": 85,
  "severity": "high",
  "summary": "**Vote: SPLIT (1/2 -\u003e SUSPICIOUS)**\n\n### \u264a gemini-cli Analysis (Primary)\nFailed or timed out.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary)\n**Verdict:** true_positive | **Confidence:** 0.95\nThis event represents a confirmed malicious execution of PowerShell commands designed to disable security controls and deploy an offensive framework (Atomic Red Team). The use of IEX with a raw GitHub URL combined with disabling real-time monitoring indicates active post-exploitation behavior rather than routine administration.\n\n**IOC Analysis:** The command line contains multiple high-risk indicators: IEX (Invoke-Expression) fetching code from an external source, disabling Microsoft Defender real-time protection, and executing Atomic Red Team modules. While the process path is legitimate (System32), the specific commands executed are not standard administrative tasks but rather offensive security testing payloads.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary)\n**Verdict:** suspicious | **Confidence:** 0.7\nThe detection event involves a PowerShell process from the legitimate System32 directory, but the command line shows suspicious activities such as changing execution policy, disabling real-time monitoring, and downloading a script from GitHub, which could indicate an attempt to evade detection and execute malicious code.\n\n**IOC Analysis:** The FILE_PATH is a known legitimate Windows system binary located in C:\\Windows\\System32\\, which is typically benign. However, the command line includes actions that are commonly associated with malicious activities, such as setting execution policy to unrestricted, modifying security protocols, installing potentially untrusted packages, disabling security features, and executing a script from an external source. The signed hash suggests it could be legitimate, but the context indicates potential misuse.",
  "verdict": "suspicious",
  "voting": {
    "auto_action": "manual_review",
    "mode": "split",
    "total_models": 2,
    "vote_summary": [
      "qwen3.5:4b: true_positive (high, 95% confidence)",
      "deepseek-r1:8b: suspicious (high, 70% confidence)"
    ],
    "votes": [
      {
        "confidence": 0.95,
        "model": "qwen3.5:4b",
        "verdict": "true_positive"
      },
      {
        "confidence": 0.7,
        "model": "deepseek-r1:8b",
        "verdict": "suspicious"
      }
    ],
    "winning_count": 1,
    "winning_verdict": "suspicious"
  }
}

โš™๏ธ Response Actions

Action Target Status Result
tag e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated failed 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
recommended Manual analyst review required โ€” AI models (split) executed General Activity Sweep: 0 events found
recommended Isolate the host immediately to prevent lateral movement executed Lateral Movement Investigation: 50 events found
recommended Block outbound traffic to GitHub raw.githubusercontent.com at the network level executed User Activity Investigation: 31 events found
recommended Review all processes spawned by PID 3268 and its parent chain (PID 7640) executed Process Tree Investigation: 75 events found
recommended Check for persistence mechanisms installed via Atomic Red Team framework executed Persistence Check: 0 events found
recommended Preserve memory dump for forensic analysis executed General Activity Sweep: 0 events found
tag e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated failed 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
recommended Manual analyst review required โ€” AI models (split) executed General Activity Sweep: 0 events found
recommended Isolate the host immediately to prevent lateral movement executed Lateral Movement Investigation: 50 events found
recommended Block outbound traffic to GitHub raw.githubusercontent.com at the network perimeter executed User Activity Investigation: 31 events found
recommended Review all PowerShell execution policies on the system and disable remote script execution executed General Activity Sweep: 0 events found
recommended Capture memory dump for forensic analysis of any data exfiltration executed Data Exfiltration Check: 25 events found
tag e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated failed 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
recommended Manual analyst review required โ€” AI models (split) executed General Activity Sweep: 0 events found
recommended Isolate the host immediately to prevent lateral movement executed Lateral Movement Investigation: 50 events found
recommended Block outbound traffic to raw.githubusercontent.com at the network perimeter executed User Activity Investigation: 31 events found
recommended Review all PowerShell execution policies and restore restricted settings executed General Activity Sweep: 0 events found
recommended Check for persistence mechanisms in startup folders or registry keys executed Persistence Check: 0 events found

๐Ÿ“ Add Note

๐Ÿ’ฌ Notes (17)

๐Ÿค– FusionSOC AI 2026-03-24T20:10
๐Ÿค– FusionSOC AI 2026-03-24T20:10
๐Ÿค– FusionSOC AI 2026-03-24T20:10
๐Ÿค– FusionSOC AI 2026-03-24T20:10
๐Ÿค– FusionSOC AI 2026-03-24T20:10
๐Ÿค– FusionSOC AI 2026-03-24T19:30
๐Ÿค– FusionSOC AI 2026-03-24T19:30
๐Ÿค– FusionSOC AI 2026-03-24T19:30
๐Ÿค– FusionSOC AI 2026-03-24T19:30
๐Ÿค– FusionSOC AI 2026-03-24T19:30
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01
๐Ÿค– FusionSOC AI 2026-03-24T18:01

๐Ÿ“œ Timeline

2026-03-24T23:14:37
analyst
Status changed: closed โ†’ closed
2026-03-24T23:14:32
analyst
Analyst classified as False Positive (FP)
2026-03-24T23:14:21
analyst
Status changed: investigating โ†’ closed
2026-03-24T23:14:13
analyst
Analyst classified as Suspicious (SUSPICIOUS)
2026-03-24T20:10:47
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T20:10:47
FusionSOC
Action recommended โ†’ executed: Persistence Check: 0 events found
2026-03-24T20:10:47
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Persistence Check **Action:** Check for persistence mechanisms in startup folders or registry keys **Sensor:** `e4a...
2026-03-24T20:10:45
FusionSOC
Response action queued: recommended on Check for persistence mechanisms in startup folders or registry keys
2026-03-24T20:10:45
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T20:10:45
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T20:10:45
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Review all PowerShell execution policies and restore restricted settings **Senso...
2026-03-24T20:10:45
FusionSOC
Response action queued: recommended on Review all PowerShell execution policies and restore restricted settings
2026-03-24T20:10:45
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T20:10:45
FusionSOC
Action recommended โ†’ executed: User Activity Investigation: 31 events found
2026-03-24T20:10:45
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” User Activity Investigation **Action:** Block outbound traffic to raw.githubusercontent.com at the network perimete...
2026-03-24T20:10:44
FusionSOC
Response action queued: recommended on Block outbound traffic to raw.githubusercontent.com at the network perimeter
2026-03-24T20:10:44
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T20:10:44
FusionSOC
Action recommended โ†’ executed: Lateral Movement Investigation: 50 events found
2026-03-24T20:10:44
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Lateral Movement Investigation **Action:** Isolate the host immediately to prevent lateral movement **Sensor:** `e4...
2026-03-24T20:10:43
FusionSOC
Response action queued: recommended on Isolate the host immediately to prevent lateral movement
2026-03-24T20:10:43
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T20:10:43
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T20:10:43
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Manual analyst review required โ€” AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T20:10:43
FusionSOC
Response action queued: recommended on Manual analyst review required โ€” AI models (split)
2026-03-24T20:10:42
FusionSOC
Action tag โ†’ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T20:10:42
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T19:30:09
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T19:30:09
FusionSOC
Action recommended โ†’ executed: Data Exfiltration Check: 25 events found
2026-03-24T19:30:09
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Data Exfiltration Check **Action:** Capture memory dump for forensic analysis of any data exfiltration **Sensor:** ...
2026-03-24T19:30:08
FusionSOC
Response action queued: recommended on Capture memory dump for forensic analysis of any data exfiltration
2026-03-24T19:30:08
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T19:30:08
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T19:30:08
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Review all PowerShell execution policies on the system and disable remote script...
2026-03-24T19:30:08
FusionSOC
Response action queued: recommended on Review all PowerShell execution policies on the system and disable remote script execution
2026-03-24T19:30:08
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T19:30:08
FusionSOC
Action recommended โ†’ executed: User Activity Investigation: 31 events found
2026-03-24T19:30:08
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” User Activity Investigation **Action:** Block outbound traffic to GitHub raw.githubusercontent.com at the network p...
2026-03-24T19:30:07
FusionSOC
Response action queued: recommended on Block outbound traffic to GitHub raw.githubusercontent.com at the network perimeter
2026-03-24T19:30:07
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T19:30:07
FusionSOC
Action recommended โ†’ executed: Lateral Movement Investigation: 50 events found
2026-03-24T19:30:07
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Lateral Movement Investigation **Action:** Isolate the host immediately to prevent lateral movement **Sensor:** `e4...
2026-03-24T19:30:06
FusionSOC
Response action queued: recommended on Isolate the host immediately to prevent lateral movement
2026-03-24T19:30:06
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T19:30:06
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T19:30:06
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Manual analyst review required โ€” AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T19:30:05
FusionSOC
Response action queued: recommended on Manual analyst review required โ€” AI models (split)
2026-03-24T19:30:05
FusionSOC
Action tag โ†’ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T19:30:05
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T18:01:41
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T18:01:41
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T18:01:41
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Preserve memory dump for forensic analysis **Sensor:** `e4a1c62d-4d1f-44...` **T...
2026-03-24T18:01:41
FusionSOC
Response action queued: recommended on Preserve memory dump for forensic analysis
2026-03-24T18:01:41
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T18:01:41
FusionSOC
Action recommended โ†’ executed: Persistence Check: 0 events found
2026-03-24T18:01:41
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Persistence Check **Action:** Check for persistence mechanisms installed via Atomic Red Team framework **Sensor:** ...
2026-03-24T18:01:40
FusionSOC
Response action queued: recommended on Check for persistence mechanisms installed via Atomic Red Team framework
2026-03-24T18:01:40
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T18:01:40
FusionSOC
Action recommended โ†’ executed: Process Tree Investigation: 75 events found
2026-03-24T18:01:40
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Process Tree Investigation **Action:** Review all processes spawned by PID 3268 and its parent chain (PID 7640) **S...
2026-03-24T18:01:39
FusionSOC
Response action queued: recommended on Review all processes spawned by PID 3268 and its parent chain (PID 7640)
2026-03-24T18:01:39
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T18:01:39
FusionSOC
Action recommended โ†’ executed: User Activity Investigation: 31 events found
2026-03-24T18:01:39
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” User Activity Investigation **Action:** Block outbound traffic to GitHub raw.githubusercontent.com at the network l...
2026-03-24T18:01:38
FusionSOC
Response action queued: recommended on Block outbound traffic to GitHub raw.githubusercontent.com at the network level
2026-03-24T18:01:38
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-24T18:01:38
FusionSOC
Action recommended โ†’ executed: Lateral Movement Investigation: 50 events found
2026-03-24T18:01:38
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” Lateral Movement Investigation **Action:** Isolate the host immediately to prevent lateral movement **Sensor:** `e4...
2026-03-24T18:01:37
FusionSOC
Response action queued: recommended on Isolate the host immediately to prevent lateral movement
2026-03-24T18:01:37
FusionSOC AI
Status changed: open โ†’ investigating
2026-03-24T18:01:37
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-24T18:01:37
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Manual analyst review required โ€” AI models (split) **Sensor:** `e4a1c62d-4d1f-44...
2026-03-24T18:01:36
FusionSOC
Response action queued: recommended on Manual analyst review required โ€” AI models (split)
2026-03-24T18:01:36
FusionSOC
Action tag โ†’ failed: 401 Client Error: Unauthorized for url: https://api.limacharlie.io/v1/e4a1c62d-4d1f-4472-bae4-43291246b4d4/tags?tags=fusionsoc-investigated
2026-03-24T18:01:36
FusionSOC
Response action queued: tag on e4a1c62d-4d1f-4472-bae4-43291246b4d4:fusionsoc-investigated
2026-03-24T18:01:36
FusionSOC AI
Detection 76a6e108-afc5-4382-aed3-276869c2a82c triaged as suspicious (high severity, confidence: 90%)
2026-03-24T18:01:36
FusionSOC AI
Case created from detection: service.WIN-PS_Invoke_Expression_Usage