โ
Case #561
general.Sensitive Process Accessed
๐ท๏ธ Analyst Verdict Classification
FP by analyst๐ค AI Analysis
๐ Detections (1)
Sensitive Process Accessed
high
Rule: general.Sensitive Process Accessed
Hostname: desktop-3nfb237 ยท Sensor: ed8f7c3f-3a1a-49...
Event Type: SENSITIVE_PROCESS_ACCESS
Confidence: 63% ยท Verdict: false positive
Event Data:
EVENTS:
[{'event': {'BASE_ADDRESS': 140702525030400, 'COMMAND_LINE': 'C:\\WINDOWS\\system32\\lsass.exe', 'CREATION_TIME': 1773245868875, 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\WINDOWS\\system32\\lsass.exe', 'HASH': '055a1226a769948a79ed0972bdee2d91937c4b521e0b9046f9b8ccc63d110115', 'MEMORY_USAGE': 19705856, 'PARENT': {'FILE_IS_SIGNED': 1, 'FILE_PATH': '\\Device\\HarddiskVolume3\\Windows\\System32\\wininit.exe', 'HASH': 'ba26910be549b8700c08fbe2f160952288864470a30dd35c3c6b7782f7dbf857', 'MEMORY_USAGE': 7323648, 'PARENT_PROCESS_ID': 720, 'PROCESS_ID': 840, 'THIS_ATOM': '58b1f2a11a942a48999a6fbd69b1964c', 'THREADS': 1, 'TIMESTAMP': 1773246028618, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}, 'PARENT_PROCESS_ID': 840, 'PROCESS_ID': 980, 'THREADS': 16, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}, 'routing': {'arch': 2, 'did': '', 'event_id': 'f1fe5251-1ba2-456b-951e-3e9bdec5a899', 'event_time': 1773246029212, 'event_type': 'EXISTING_PROCESS', 'ext_ip': '23.128.32.10', 'hostname': 'desktop-3nfb237', 'iid': 'b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175', 'int_ip': '192.168.50.40', 'latency': 1222208941, 'moduleid': 2, 'oid': 'd3541070-8b0e-4663-8a6a-aa0727aacd36', 'parent': '58b1f2a11a942a48999a6fbd69b1964c', 'plat': 268435456, 'sid': 'ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136', 'tags': ['fusion-soc-alert', 'fusion-soc-case', 'fusion-soc-pulled', 'fusion-soc-triage', 'fusionsoc-critical', 'fusionsoc-high', 'fusionsoc-investigated', 'qucikbooks', 'windows', 'yara_detection_memory'], 'this': 'b2fe617fb2365f162bc5846069b1964d'}}, {'event': {'ACCESS_FLAGS': 2097151, 'PARENT_PROCESS_ID': 4, 'PROCESS_ID': 980, 'SOURCE': {'MEMORY_USAGE': 1658880, 'PARENT_PROCESS_ID': 0, 'PROCESS_ID': 4, 'THIS_ATOM': 'eb3d8e0e5521ebfea94a557969b1964c', 'THREADS': 209, 'TIMESTAMP': 1773246028555, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}, 'TARGET': {'BASE_ADDRESS': 140702525030400, 'COMMAND_LINE': 'C:\\WINDOWS\\system32\\lsass.exe', 'CREATION_TIME': 1773245868875, 'FILE_IS_SIGNED': 1, 'FILE_PATH': 'C:\\WINDOWS\\system32\\lsass.exe', 'HASH': '055a1226a769948a79ed0972bdee2d91937c4b521e0b9046f9b8ccc63d110115', 'MEMORY_USAGE': 19705856, 'PARENT_ATOM': '58b1f2a11a942a48999a6fbd69b1964c', 'PARENT_PROCESS_ID': 840, 'PROCESS_ID': 980, 'THIS_ATOM': 'b2fe617fb2365f162bc5846069b1964d', 'THREADS': 16, 'TIMESTAMP': 1773246029212, 'USER_NAME': 'NT AUTHORITY\\SYSTEM'}}, 'routing': {'arch': 2, 'did': '', 'event_id': '78e9d2a5-a707-44f6-bbba-a8505cdcd73c', 'event_time': 1774468235848, 'event_type': 'REMOTE_PROCESS_HANDLE', 'ext_ip': '23.128.32.10', 'hostname': 'desktop-3nfb237', 'iid': 'b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175', 'int_ip': '192.168.50.40', 'latency': 2305, 'moduleid': 2, 'oid': 'd3541070-8b0e-4663-8a6a-aa0727aacd36', 'parent': 'eb3d8e0e5521ebfea94a557969b1964c', 'plat': 268435456, 'sid': 'ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136', 'tags': ['fusion-soc-alert', 'fusion-soc-case', 'fusion-soc-pulled', 'fusion-soc-triage', 'fusionsoc-critical', 'fusionsoc-high', 'fusionsoc-investigated', 'qucikbooks', 'windows', 'yara_detection_memory'], 'target': 'b2fe617fb2365f162bc5846069b1964d', 'this': '0b3ac7269ee237f65bb74d4169c43c8c'}}]
Analyst Declaration:
๐ Raw Detection JSON
{
"author": "ckeller@fusioncybersecurity.us",
"cat": "Sensitive Process Accessed",
"detect": {
"event": {
"EVENTS": [
{
"event": {
"BASE_ADDRESS": 140702525030400,
"COMMAND_LINE": "C:\\WINDOWS\\system32\\lsass.exe",
"CREATION_TIME": 1773245868875,
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\WINDOWS\\system32\\lsass.exe",
"HASH": "055a1226a769948a79ed0972bdee2d91937c4b521e0b9046f9b8ccc63d110115",
"MEMORY_USAGE": 19705856,
"PARENT": {
"FILE_IS_SIGNED": 1,
"FILE_PATH": "\\Device\\HarddiskVolume3\\Windows\\System32\\wininit.exe",
"HASH": "ba26910be549b8700c08fbe2f160952288864470a30dd35c3c6b7782f7dbf857",
"MEMORY_USAGE": 7323648,
"PARENT_PROCESS_ID": 720,
"PROCESS_ID": 840,
"THIS_ATOM": "58b1f2a11a942a48999a6fbd69b1964c",
"THREADS": 1,
"TIMESTAMP": 1773246028618,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"PARENT_PROCESS_ID": 840,
"PROCESS_ID": 980,
"THREADS": 16,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"routing": {
"arch": 2,
"did": "",
"event_id": "f1fe5251-1ba2-456b-951e-3e9bdec5a899",
"event_time": 1773246029212,
"event_type": "EXISTING_PROCESS",
"ext_ip": "23.128.32.10",
"hostname": "desktop-3nfb237",
"iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
"int_ip": "192.168.50.40",
"latency": 1222208941,
"moduleid": 2,
"oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
"parent": "58b1f2a11a942a48999a6fbd69b1964c",
"plat": 268435456,
"sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
"tags": [
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage",
"fusionsoc-critical",
"fusionsoc-high",
"fusionsoc-investigated",
"qucikbooks",
"windows",
"yara_detection_memory"
],
"this": "b2fe617fb2365f162bc5846069b1964d"
}
},
{
"event": {
"ACCESS_FLAGS": 2097151,
"PARENT_PROCESS_ID": 4,
"PROCESS_ID": 980,
"SOURCE": {
"MEMORY_USAGE": 1658880,
"PARENT_PROCESS_ID": 0,
"PROCESS_ID": 4,
"THIS_ATOM": "eb3d8e0e5521ebfea94a557969b1964c",
"THREADS": 209,
"TIMESTAMP": 1773246028555,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
},
"TARGET": {
"BASE_ADDRESS": 140702525030400,
"COMMAND_LINE": "C:\\WINDOWS\\system32\\lsass.exe",
"CREATION_TIME": 1773245868875,
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\WINDOWS\\system32\\lsass.exe",
"HASH": "055a1226a769948a79ed0972bdee2d91937c4b521e0b9046f9b8ccc63d110115",
"MEMORY_USAGE": 19705856,
"PARENT_ATOM": "58b1f2a11a942a48999a6fbd69b1964c",
"PARENT_PROCESS_ID": 840,
"PROCESS_ID": 980,
"THIS_ATOM": "b2fe617fb2365f162bc5846069b1964d",
"THREADS": 16,
"TIMESTAMP": 1773246029212,
"USER_NAME": "NT AUTHORITY\\SYSTEM"
}
},
"routing": {
"arch": 2,
"did": "",
"event_id": "78e9d2a5-a707-44f6-bbba-a8505cdcd73c",
"event_time": 1774468235848,
"event_type": "REMOTE_PROCESS_HANDLE",
"ext_ip": "23.128.32.10",
"hostname": "desktop-3nfb237",
"iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
"int_ip": "192.168.50.40",
"latency": 2305,
"moduleid": 2,
"oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
"parent": "eb3d8e0e5521ebfea94a557969b1964c",
"plat": 268435456,
"sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
"tags": [
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage",
"fusionsoc-critical",
"fusionsoc-high",
"fusionsoc-investigated",
"qucikbooks",
"windows",
"yara_detection_memory"
],
"target": "b2fe617fb2365f162bc5846069b1964d",
"this": "0b3ac7269ee237f65bb74d4169c43c8c"
}
}
]
},
"routing": {
"arch": 2,
"did": "",
"event_id": "47f8102b-9f36-4677-b4aa-dc12fdc424a5",
"event_time": 1774468236348,
"event_type": "SENSITIVE_PROCESS_ACCESS",
"ext_ip": "23.128.32.10",
"hostname": "desktop-3nfb237",
"iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
"int_ip": "192.168.50.40",
"latency": 1805,
"moduleid": 2,
"oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
"parent": "eb3d8e0e5521ebfea94a557969b1964c",
"plat": 268435456,
"sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
"tags": [
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage",
"fusionsoc-critical",
"fusionsoc-high",
"fusionsoc-investigated",
"qucikbooks",
"windows",
"yara_detection_memory"
],
"target": "b2fe617fb2365f162bc5846069b1964d",
"this": "8bfbdad7abd4dd40b91f8a5769c43c8c"
}
},
"detect_id": "b72f9e46-8e19-4cd9-a894-7b2e69c43c8e",
"gen_time": 1774468238153,
"link": "https://app.limacharlie.io/orgs/d3541070-8b0e-4663-8a6a-aa0727aacd36/sensors/ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136/timeline?time=1774468236\u0026selected=8bfbdad7abd4dd40b91f8a5769c43c8c",
"namespace": "general",
"routing": {
"arch": 2,
"did": "",
"event_id": "47f8102b-9f36-4677-b4aa-dc12fdc424a5",
"event_time": 1774468236348,
"event_type": "SENSITIVE_PROCESS_ACCESS",
"ext_ip": "23.128.32.10",
"hostname": "desktop-3nfb237",
"iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
"int_ip": "192.168.50.40",
"latency": 1805,
"moduleid": 2,
"oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
"parent": "eb3d8e0e5521ebfea94a557969b1964c",
"plat": 268435456,
"sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
"tags": [
"fusion-soc-alert",
"fusion-soc-case",
"fusion-soc-pulled",
"fusion-soc-triage",
"fusionsoc-critical",
"fusionsoc-high",
"fusionsoc-investigated",
"qucikbooks",
"windows",
"yara_detection_memory"
],
"target": "b2fe617fb2365f162bc5846069b1964d",
"this": "8bfbdad7abd4dd40b91f8a5769c43c8c"
},
"source": "d3541070-8b0e-4663-8a6a-aa0727aacd36.b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175.ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136.10000000.2",
"source_rule": "general.Sensitive Process Accessed",
"ts": 1774468238000
}
๐ Threat Intel JSON
{
"virustotal": [
{
"malicious": false,
"provider": "virustotal",
"reputation": 0,
"stats": {
"confirmed-timeout": 0,
"failure": 0,
"harmless": 0,
"malicious": 0,
"suspicious": 0,
"timeout": 0,
"type-unsupported": 4,
"undetected": 72
}
},
{
"malicious": false,
"provider": "virustotal",
"reputation": 10,
"stats": {
"confirmed-timeout": 0,
"failure": 1,
"harmless": 0,
"malicious": 0,
"suspicious": 0,
"timeout": 0,
"type-unsupported": 4,
"undetected": 71
}
}
]
}
๐ค Triage JSON
{
"confidence": 0.633,
"false_positive_reason": null,
"investigation_questions": [],
"ioc_analysis": "",
"iocs_extracted": [],
"mitre_techniques": [],
"recommended_actions": [
"Manual analyst review required \u2014 AI models (majority)",
"Manual review required"
],
"risk_score": 23,
"severity": "high",
"summary": "**Vote: MAJORITY (2/3 -\u003e FALSE POSITIVE)**\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary + RAG)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detection event flags lsass.exe access, but the process is a known Microsoft-signed system binary running from its expected location in System32 with no suspicious parent-child relationships or anomalous behavior detected.\n\n**IOC Analysis:** lsass.exe is a legitimate Windows system process responsible for security authentication. The file path matches the expected location (C:\\WINDOWS\\system32\\), the binary is signed, and historical analyst feedback consistently marks this rule as false positive for standard system activity.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary + RAG)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detection event involves a legitimate Windows system process accessing LSASS.EXE, which is a standard binary in the System32 directory. No malicious indicators or suspicious activity were found in the investigation.\n\n**IOC Analysis:** The FILE_PATH \u0027C:\\WINDOWS\\system32\\lsass.exe\u0027 is a known Windows system binary located in the expected directory. It is signed and spawned from \u0027C:\\WINDOWS\\system32\\wininit.exe\u0027, another legitimate system process, confirming it is benign. The HASH matches a known Microsoft-signed binary.",
"verdict": "false_positive",
"voting": {
"auto_action": "manual_review",
"mode": "majority",
"total_models": 3,
"vote_summary": [
"gemini-cli: true_positive (medium, 0% confidence)",
"qwen3.5:4b +RAG: false_positive (informational, 95% confidence)",
"deepseek-r1:8b +RAG: false_positive (informational, 95% confidence)"
],
"votes": [
{
"confidence": 0.0,
"model": "gemini-cli",
"verdict": "true_positive"
},
{
"confidence": 0.95,
"had_rag": true,
"model": "qwen3.5:4b",
"verdict": "false_positive"
},
{
"confidence": 0.95,
"had_rag": true,
"model": "deepseek-r1:8b",
"verdict": "false_positive"
}
],
"winning_count": 2,
"winning_verdict": "false_positive"
}
}
โ๏ธ Response Actions
| Action | Target | Status | Result | |
|---|---|---|---|---|
| tag | executed | Tag applied | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| tag | executed | Tag applied | ||
| recommended | executed | Process Tree Investigation: 50 events found | ||
| recommended | executed | General Activity Sweep: 0 events found | ||
| tag | executed | Tag applied | ||
| recommended | executed | General Activity Sweep: 0 events found |
๐ Add Note
๐ฌ Notes (8)
๐ค FusionSOC AI
2026-03-25T23:07
๐ค FusionSOC AI
2026-03-25T23:06
๐ค FusionSOC AI
2026-03-25T21:52
๐ค FusionSOC AI
2026-03-25T21:52
๐ค FusionSOC AI
2026-03-25T21:52
๐ค FusionSOC AI
2026-03-25T21:46
๐ค FusionSOC AI
2026-03-25T21:46
๐ค FusionSOC AI
2026-03-25T21:46
๐ Timeline
2026-03-26T14:34:17
analyst
Status changed: investigating โ closed
2026-03-26T14:34:09
analyst
Analyst classified as False Positive (FP)
2026-03-25T23:07:11
FusionSOC AI
Note by FusionSOC AI: ## ๐ณ๏ธ Secondary Vote (RAG-Enhanced) **Vote:** MAJORITY (2/3 โ FALSE POSITIVE) - gemini-cli: true_positive (medium, 0% c...
2026-03-25T23:06:56
FusionSOC AI
Status changed: investigating โ investigating
2026-03-25T23:06:56
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-25T23:06:56
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual review required **Sensor:** `ed8f7c3f-3a1a-49...` **Time Window:** +/- 2 ...
2026-03-25T23:06:56
FusionSOC
Response action queued: recommended on Manual review required
2026-03-25T23:06:56
FusionSOC
Action tag โ executed: Tag applied
2026-03-25T23:06:56
FusionSOC
Response action queued: tag on ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated
2026-03-25T21:52:16
FusionSOC AI
Note by FusionSOC AI: ## ๐ณ๏ธ Secondary Vote (RAG-Enhanced) **Vote:** UNANIMOUS (3/3 โ FALSE POSITIVE) - gemini-cli: false_positive (low, 95% c...
2026-03-25T21:52:02
FusionSOC AI
Status changed: investigating โ investigating
2026-03-25T21:52:02
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-25T21:52:02
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Mark detection as false positive and close the alert **Sensor:** `ed8f7c3f-3a1a-...
2026-03-25T21:52:02
FusionSOC
Response action queued: recommended on Mark detection as false positive and close the alert
2026-03-25T21:52:02
FusionSOC AI
Status changed: investigating โ investigating
2026-03-25T21:52:02
FusionSOC
Action recommended โ executed: Process Tree Investigation: 50 events found
2026-03-25T21:52:02
FusionSOC AI
Note by FusionSOC AI: ## ๐ Process Tree Investigation **Action:** Whitelist msiexec.exe for the 'Sensitive Process Accessed' rule when running...
2026-03-25T21:52:00
FusionSOC
Response action queued: recommended on Whitelist msiexec.exe for the 'Sensitive Process Accessed' rule when running from System32
2026-03-25T21:52:00
FusionSOC
Action tag โ executed: Tag applied
2026-03-25T21:52:00
FusionSOC
Response action queued: tag on ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated
2026-03-25T21:46:30
FusionSOC AI
Note by FusionSOC AI: ## ๐ณ๏ธ Secondary Vote (RAG-Enhanced) **Vote:** MAJORITY (2/3 โ FALSE POSITIVE) - gemini-cli: true_positive (medium, 0% c...
2026-03-25T21:46:09
FusionSOC AI
Status changed: open โ investigating
2026-03-25T21:46:09
FusionSOC
Action recommended โ executed: General Activity Sweep: 0 events found
2026-03-25T21:46:09
FusionSOC AI
Note by FusionSOC AI: ## ๐ General Activity Sweep **Action:** Manual review required **Sensor:** `ed8f7c3f-3a1a-49...` **Time Window:** +/- 2 ...
2026-03-25T21:46:09
FusionSOC
Response action queued: recommended on Manual review required
2026-03-25T21:46:09
FusionSOC
Action tag โ executed: Tag applied
2026-03-25T21:46:09
FusionSOC
Response action queued: tag on ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated
2026-03-25T21:46:09
FusionSOC AI
Detection b72f9e46-8e19-4cd9-a894-7b2e69c43c8e triaged as true_positive (medium severity, confidence: 0%)
2026-03-25T21:46:09
FusionSOC AI
Case created from detection: general.Sensitive Process Accessed