Analysis Workflow

Print Friendly, PDF & Email

The Analysis workflow helps the IR investigate the suspicious event(s) that generated the alerts. The Analysis workflow displays the processes that triggered the alert based on the corresponding rule. The first file that started the sequence of security events and the following processes are displayed in a collapsible tree like flow. Starting from the first process/file, clicking on an event displays the further events that occurred and the corresponding details. You can explore the process flow up to the last occurred event.

The following screenshots show, step by step, how an IR starts the analysis for an alert.

  1. First the IR opens the analysis workflow for an alert on the dashboard. To get additional details about the chosen alert, Click View details.
  1. IR then clicks on host name icon displayed on the screen.

Alert displays Host Name

  1. The filename powershell.exe is displayed on the screen which further led to execution of some modules.

    Alert displays File Name modules

  1. To investigate further, the IR then clicks on powershell.exe icon.
    The screen displays the following:
    — Count of modules that were loaded by the powershell.exe executable and any exploitable host programs.
    — The basic information for the process details of powershell.exe, time of execution, start time, end time, path, MD5 count, SHA count, the command line, and the drive type is displayed.
    –The binary information, and the endpoint details such as the Username, Hostname and the operating system on the host are displayed on the right pane.

Alert Process Details

— The filename and time stamp details executed that were loaded are displayed in the right pane.

— The screen also shows that the file powershell.exe loaded on exploitable host program in memory.

 Alert File Details

This analysis can be followed further, right up to the last action that was initiated by the alerted process.

Was this page helpful?