high closed false positive

๐Ÿท๏ธ Analyst Verdict Classification

FP by analyst

๐Ÿค– AI Analysis

๐Ÿ”” Detections (1)

New Code Atypical Path high
Rule: general.NEW FILE WRITE BYTES SAMPLE GRAB
Hostname: desktop-3nfb237 ยท Sensor: ed8f7c3f-3a1a-49...
Event Type: NEW_DOCUMENT
Confidence: 95% ยท Verdict: false positive
Event Data:
FILE_PATH:
C:\Windows\Temp\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\MipDlp.exe
HASH:
48e31757279968e3dc5fe0f9c0926a4397635950764c5377df4745265d5d4525
PROCESS_ID:
17988
IOCs: C:\Windows\Temp\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\MipDlp.exe 48e31757279968e3dc5fe0f9c0926a4397635950764c5377df4745265d5d4525
Analyst Declaration:
๐Ÿ“„ Raw Detection JSON
{
  "author": "ckeller@fusioncybersecurity.us",
  "cat": "New Code Atypical Path",
  "detect": {
    "event": {
      "FILE_PATH": "C:\\Windows\\Temp\\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\\MipDlp.exe",
      "HASH": "48e31757279968e3dc5fe0f9c0926a4397635950764c5377df4745265d5d4525",
      "PROCESS_ID": 17988
    },
    "routing": {
      "arch": 2,
      "did": "",
      "event_id": "9c3d639b-cac4-4089-b96b-a3687b8f77c2",
      "event_time": 1774468112408,
      "event_type": "NEW_DOCUMENT",
      "ext_ip": "23.128.32.10",
      "hostname": "desktop-3nfb237",
      "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
      "int_ip": "192.168.50.40",
      "latency": 3018,
      "moduleid": 2,
      "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
      "parent": "9727bc761f07cc5e5c90b93a69c43c07",
      "plat": 268435456,
      "sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
      "tags": [
        "fusion-soc-alert",
        "fusion-soc-case",
        "fusion-soc-pulled",
        "fusion-soc-triage",
        "fusionsoc-critical",
        "fusionsoc-high",
        "fusionsoc-investigated",
        "qucikbooks",
        "windows",
        "yara_detection_memory"
      ],
      "this": "fe5bfe3f022584d716fa30ca69c43c12"
    }
  },
  "detect_id": "16526a24-6671-4540-b019-1a3569c43c13",
  "gen_time": 1774468115426,
  "link": "https://app.limacharlie.io/orgs/d3541070-8b0e-4663-8a6a-aa0727aacd36/sensors/ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136/timeline?time=1774468112\u0026selected=fe5bfe3f022584d716fa30ca69c43c12",
  "namespace": "general",
  "routing": {
    "arch": 2,
    "did": "",
    "event_id": "9c3d639b-cac4-4089-b96b-a3687b8f77c2",
    "event_time": 1774468112408,
    "event_type": "NEW_DOCUMENT",
    "ext_ip": "23.128.32.10",
    "hostname": "desktop-3nfb237",
    "iid": "b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175",
    "int_ip": "192.168.50.40",
    "latency": 3018,
    "moduleid": 2,
    "oid": "d3541070-8b0e-4663-8a6a-aa0727aacd36",
    "parent": "9727bc761f07cc5e5c90b93a69c43c07",
    "plat": 268435456,
    "sid": "ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136",
    "tags": [
      "fusion-soc-alert",
      "fusion-soc-case",
      "fusion-soc-pulled",
      "fusion-soc-triage",
      "fusionsoc-critical",
      "fusionsoc-high",
      "fusionsoc-investigated",
      "qucikbooks",
      "windows",
      "yara_detection_memory"
    ],
    "this": "fe5bfe3f022584d716fa30ca69c43c12"
  },
  "source": "d3541070-8b0e-4663-8a6a-aa0727aacd36.b2cd59fc-d09d-49e0-a9f2-1fd79ee9c175.ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136.10000000.2",
  "source_rule": "general.NEW FILE WRITE BYTES SAMPLE GRAB",
  "ts": 1774468115000
}
๐ŸŒ Threat Intel JSON
{
  "virustotal": {
    "malicious": false,
    "provider": "virustotal",
    "reputation": 0,
    "stats": {
      "confirmed-timeout": 0,
      "failure": 0,
      "harmless": 0,
      "malicious": 0,
      "suspicious": 0,
      "timeout": 0,
      "type-unsupported": 4,
      "undetected": 72
    }
  }
}
๐Ÿค– Triage JSON
{
  "confidence": 0.95,
  "false_positive_reason": "Legitimate system binary in a temporary staging path during a software update.",
  "investigation_questions": [
    "Verify if the file was subsequently moved to a legitimate path such as C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\ or C:\\Program Files\\Windows Defender Advanced Threat Protection\\.",
    "Identify the parent process that wrote the file to confirm it was a legitimate update service (e.g., MsMpEng.exe or services.exe)."
  ],
  "ioc_analysis": "MipDlp.exe is a known Microsoft-signed binary used for Data Loss Prevention. The specific path C:\\Windows\\Temp\\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\\ is a typical staging directory used by Windows Update and Microsoft Defender to extract and prepare binaries before deployment to their final system directories.",
  "iocs_extracted": [
    "C:\\Windows\\Temp\\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\\MipDlp.exe",
    "48e31757279968e3dc5fe0f9c0926a4397635950764c5377df4745265d5d4525"
  ],
  "mitre_techniques": [],
  "recommended_actions": [
    "Manual analyst review required \u2014 AI models (unanimous)",
    "No action required.",
    "Consider tuning the \u0027NEW FILE WRITE BYTES SAMPLE GRAB\u0027 rule to exclude known-good Microsoft-signed binaries if they are found in common staging paths like C:\\Windows\\Temp or C:\\Windows\\SoftwareDistribution."
  ],
  "risk_score": 7,
  "severity": "high",
  "summary": "**Vote: UNANIMOUS (3/3 -\u003e FALSE POSITIVE)**\n\n### \u264a gemini-cli Analysis (Primary)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detected file MipDlp.exe is a legitimate component of Microsoft Information Protection (MIP) Data Loss Prevention, part of the Microsoft Defender for Endpoint suite. The location in a C:\\Windows\\Temp subfolder is consistent with temporary staging during a Microsoft security platform update or installation process.\n\n**IOC Analysis:** MipDlp.exe is a known Microsoft-signed binary used for Data Loss Prevention. The specific path C:\\Windows\\Temp\\3A22930E-7933-4932-A06B-DA4B7DB2FB1F\\ is a typical staging directory used by Windows Update and Microsoft Defender to extract and prepare binaries before deployment to their final system directories.\n\n---\n\n### \ud83e\udd16 qwen3.5:4b Analysis (Secondary + RAG)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detection of MipDlp.exe in C:\\Windows\\Temp is a false positive as it is a legitimate Microsoft Information Protection component. The process tree shows standard deployment behavior with MpSigStub.exe running under SYSTEM context.\n\n**IOC Analysis:** MipDlp.exe is a known-good Microsoft binary used for Data Loss Prevention features. Its presence in the Temp directory aligns with Microsoft\u0027s software update and deployment patterns, not malicious behavior. The hash matches legitimate Microsoft binaries.\n\n---\n\n### \ud83e\udd16 deepseek-r1:8b Analysis (Secondary + RAG)\n**Verdict:** false_positive | **Confidence:** 0.95\nThe detection event flagged a file write by MipDlp.exe, which is a legitimate Microsoft Information Protection DLP component. Automated investigations and AI models confirmed no malicious activity, leading to a false positive verdict.\n\n**IOC Analysis:** The FILE_PATH is in C:\\Windows\\Temp, a common temporary directory for legitimate software updates. The HASH corresponds to a Microsoft-signed binary for MIP DLP, not a standard system binary. It is not running from expected system directories, but the context confirms it is part of standard Microsoft deployment, making it benign.",
  "verdict": "false_positive",
  "voting": {
    "auto_action": "manual_review",
    "mode": "unanimous",
    "total_models": 3,
    "vote_summary": [
      "gemini-cli: false_positive (low, 95% confidence)",
      "qwen3.5:4b +RAG: false_positive (informational, 95% confidence)",
      "deepseek-r1:8b +RAG: false_positive (low, 95% confidence)"
    ],
    "votes": [
      {
        "confidence": 0.95,
        "model": "gemini-cli",
        "verdict": "false_positive"
      },
      {
        "confidence": 0.95,
        "had_rag": true,
        "model": "qwen3.5:4b",
        "verdict": "false_positive"
      },
      {
        "confidence": 0.95,
        "had_rag": true,
        "model": "deepseek-r1:8b",
        "verdict": "false_positive"
      }
    ],
    "winning_count": 3,
    "winning_verdict": "false_positive"
  }
}

โš™๏ธ Response Actions

Action Target Status Result
tag ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated executed Tag applied
recommended Whitelist the MipDlp.exe binary hash if it continues to trigger this hunting rule. executed General Activity Sweep: 0 events found
recommended No further investigation required. executed General Activity Sweep: 0 events found
tag ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated executed Tag applied
recommended No action required. executed General Activity Sweep: 0 events found
recommended Consider tuning the 'NEW FILE WRITE BYTES SAMPLE GRAB' rule to exclude known-good Microsoft-signed binaries if they are found in common staging paths like C:\Windows\Temp or C:\Windows\SoftwareDistribution. executed File Activity Investigation: 0 events found

๐Ÿ“ Add Note

๐Ÿ’ฌ Notes (7)

๐Ÿค– FusionSOC AI 2026-03-26T00:53
๐Ÿค– FusionSOC AI 2026-03-26T00:52
๐Ÿค– FusionSOC AI 2026-03-26T00:52
๐Ÿค– FusionSOC AI 2026-03-26T00:50
๐Ÿค– FusionSOC AI 2026-03-26T00:50
๐Ÿค– FusionSOC AI 2026-03-26T00:50
๐Ÿค– FusionSOC AI 2026-03-26T00:50

๐Ÿ“œ Timeline

2026-03-26T14:34:17
analyst
Status changed: investigating โ†’ closed
2026-03-26T14:34:09
analyst
Analyst classified as False Positive (FP)
2026-03-26T00:53:08
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ—ณ๏ธ Secondary Vote (RAG-Enhanced) **Vote:** UNANIMOUS (3/3 โ†’ FALSE POSITIVE) - gemini-cli: false_positive (low, 95% c...
2026-03-26T00:52:47
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-26T00:52:47
FusionSOC
Action recommended โ†’ executed: File Activity Investigation: 0 events found
2026-03-26T00:52:47
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” File Activity Investigation **Action:** Consider tuning the 'NEW FILE WRITE BYTES SAMPLE GRAB' rule to exclude know...
2026-03-26T00:52:45
FusionSOC
Response action queued: recommended on Consider tuning the 'NEW FILE WRITE BYTES SAMPLE GRAB' rule to exclude known-good Microsoft-signed binaries if they are found in common staging paths like C:\Windows\Temp or C:\Windows\SoftwareDistribution.
2026-03-26T00:52:45
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-26T00:52:45
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-26T00:52:45
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** No action required. **Sensor:** `ed8f7c3f-3a1a-49...` **Time Window:** +/- 2 min...
2026-03-26T00:52:44
FusionSOC
Response action queued: recommended on No action required.
2026-03-26T00:52:44
FusionSOC
Action tag โ†’ executed: Tag applied
2026-03-26T00:52:44
FusionSOC
Response action queued: tag on ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated
2026-03-26T00:50:55
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ—ณ๏ธ Secondary Vote (RAG-Enhanced) **Vote:** UNANIMOUS (3/3 โ†’ FALSE POSITIVE) - gemini-cli: false_positive (low, 100% ...
2026-03-26T00:50:36
FusionSOC AI
Status changed: investigating โ†’ investigating
2026-03-26T00:50:36
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-26T00:50:36
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** No further investigation required. **Sensor:** `ed8f7c3f-3a1a-49...` **Time Wind...
2026-03-26T00:50:36
FusionSOC
Response action queued: recommended on No further investigation required.
2026-03-26T00:50:36
FusionSOC AI
Status changed: open โ†’ investigating
2026-03-26T00:50:36
FusionSOC
Action recommended โ†’ executed: General Activity Sweep: 0 events found
2026-03-26T00:50:36
FusionSOC AI
Note by FusionSOC AI: ## ๐Ÿ” General Activity Sweep **Action:** Whitelist the MipDlp.exe binary hash if it continues to trigger this hunting rul...
2026-03-26T00:50:35
FusionSOC
Response action queued: recommended on Whitelist the MipDlp.exe binary hash if it continues to trigger this hunting rule.
2026-03-26T00:50:35
FusionSOC
Action tag โ†’ executed: Tag applied
2026-03-26T00:50:34
FusionSOC
Response action queued: tag on ed8f7c3f-3a1a-493e-8fa4-35eb8c30b136:fusionsoc-investigated
2026-03-26T00:50:34
FusionSOC AI
Detection 16526a24-6671-4540-b019-1a3569c43c13 triaged as false_positive (low severity, confidence: 100%)
2026-03-26T00:50:34
FusionSOC AI
Case created from detection: general.NEW FILE WRITE BYTES SAMPLE GRAB