Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 14:04:24 UTC

Malware Signature Match

Low False Positive
ALR-00287 · 2026-04-08T06:16:54Z

Description

Known malware signature (Emotet variant) detected in file on WS-LAP-010. Cloud Connector quarantined the file. User context: r.davies.

Alert Metadata

Alert ID
ALR-00287
Timestamp
2026-04-08T06:16:54Z
Severity
Low
Status
False Positive
Detection Source
Cloud Connector
Assigned Analyst
EmilyAI (auto)

Endpoint Information

Hostname
WS-LAP-010
User Account
r.davies
Source IP
91.33.195.132
Destination IP
10.3.116.16
Origin Country
UA Ukraine

MITRE ATT&CK Mapping

Tactic
Execution
Technique
T1204.002
Reference
attack.mitre.org/techniques/T1204.002

Investigation Timeline

06:16:54 Event ingested by SOC365 Engine
06:16:58 EmilyAI triage started — correlation enrichment
06:17:03 EmilyAI confidence: 96% — escalated to human analyst
06:17:18 Alert assigned to analyst: EmilyAI (auto)
06:18:08 Investigation started — querying SIEM and threat intelligence
06:22:06 Containment action taken — endpoint isolated
06:33:13 Alert resolved — remediation complete

Related Alerts

ID Time Alert Severity Status Host
ALR-00204 12h ago Insider Threat Indicator Informational Open WS-LAP-010
ALR-00374 22h ago Anomalous DNS Query Informational False Positive WS-LAP-010
ALR-00169 1d ago Malware Signature Match Medium Open WS-PC-003
ALR-00305 1d ago Credential Stuffing Attempt Low Escalated WS-LAP-010
ALR-00103 1d ago Suspicious PowerShell Execution Medium Investigating WS-LAP-010