AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
18 March 2026

SOC119 โ€“ Proxy Alert: Malicious Executable File Detected (False Positive)

by

๐Ÿง  Summary

This investigation was triggered by a SOC119 โ€“ Proxy: Malicious Executable File Detected alert involving a request to download a file from win-rar.com.

At first glance, the alert appeared suspicious due to executable file download behavior. However, detailed analysis confirmed that the activity was legitimate and related to a normal user-initiated download from the official WinRAR website.

All supporting evidence, including process execution, network activity, and threat intelligence results, confirmed this as a false positive alert.


๐Ÿšจ Alert Overview


๐Ÿ–ฅ๏ธ Endpoint Information


๐Ÿ” Log Analysis

Log Result

Attribute Value
Process chrome.exe
Parent Process explorer.exe
Request Method GET
Action Allowed

๐Ÿง  Analysis


๐ŸŒ URL Analysis

๐Ÿ”Ž VirusTotal (URL)

VT URL Result

Result Value
Detection Ratio 0 / 95
Verdict Clean

๐ŸŒ IP Analysis

๐Ÿ”Ž VirusTotal (IP: 51.195.68.163)

VT Dest IP Result

Result Value
Detection Ratio 0 / 94
ASN OVH SAS
Country France

๐Ÿ”Ž Domain Lookup

Domain Lookup Result

๐Ÿง  Analysis


๐Ÿ“Š Behavioral Analysis

Check Result
Suspicious Process โŒ None
Malware Execution โŒ None
Network Anomalies โŒ None
CLI Activity โŒ None
Browser History โœ… Legitimate download
Endpoint Agent โš ๏ธ Agent Down (Visibility Gap)

โš ๏ธ Key Observation


๐Ÿงพ Investigation Steps

  1. Reviewed alert metadata and proxy logs
  2. Analyzed request URL and domain reputation
  3. Verified process chain (chrome.exe โ†’ explorer.exe)
  4. Checked endpoint telemetry (process, CLI, network)
  5. Investigated URL in VirusTotal
  6. Investigated destination IP reputation
  7. Correlated all findings with user activity

๐Ÿ“Œ Final Verdict

Category Result
File Source Legitimate
Malware Presence Not Detected
User Activity Normal
Alert Classification False Positive
Incident Severity Informational

๐Ÿ Conclusion

This alert was triggered due to detection of an executable file download via proxy logs.

However, the request was made to the official WinRAR website and initiated by a legitimate browser process.

No indicators of compromise, malicious execution, or abnormal behavior were identified.

This activity is classified as a false positive, representing normal user download behavior.


tags: