Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 15:20:17 UTC

Suspicious PowerShell Execution

Critical Open
ALR-00350 · 2026-04-10T06:30:11Z

Description

Encoded PowerShell command executed on WS-PC-004 by user 'a.wilson'. Command attempts to download and execute remote payload. Flagged by Dark Web Monitor.

Alert Metadata

Alert ID
ALR-00350
Timestamp
2026-04-10T06:30:11Z
Severity
Critical
Status
Open
Detection Source
Dark Web Monitor
Assigned Analyst
Emma Richardson

Endpoint Information

Hostname
WS-PC-004
User Account
a.wilson
Source IP
194.249.62.195
Destination IP
10.2.7.232
Origin Country
UA Ukraine

MITRE ATT&CK Mapping

Tactic
Execution
Technique
T1059.001
Reference
attack.mitre.org/techniques/T1059.001

Investigation Timeline

06:30:11 Event ingested by SOC365 Engine
06:30:14 EmilyAI triage started — correlation enrichment
06:30:23 EmilyAI confidence: 79% — escalated to human analyst
06:30:33 Alert assigned to analyst: Emma Richardson
06:31:02 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00360 2h ago Suspicious PowerShell Execution Informational False Positive WS-LAP-010
ALR-00002 4h ago C2 Beacon Activity Informational Open WS-PC-004
ALR-00206 6h ago Ransomware Behaviour Detected Low Escalated WS-PC-004
ALR-00092 7h ago Insider Threat Indicator High Open WS-PC-004
ALR-00312 8h ago Unauthorised USB Device Medium Open WS-PC-004