Details for Detection Status
The relation of process execution and suspicious behavior
is visualized in the detection status. A host system and objects such
as a process, file, registry, network, etc are displayed as icons. An
arrow will be used to show the relation for individual objects, and when
the system name, process name, or file name is selected in the suspicious
behavior tree, the summary for the selected object will be displayed.
You can view the following
information from Detection Status Details:
- Check co-relation for the detected system/file/process
- Respond to the detected system/file/process.
(Block Network, Collect Artifact, Terminate Process, Search for Files/Collect
Files)
Note
Exception cases, which do not record logs for suspicious
behaviors, may not be properly displayed in the process tree diagram.
The exception cases are as follows:
1) If the same behavior does not occur within the next 20 minutes, the
logs for suspicious behaviors will not be created. In such a case, a tree
may be disconnected as logs are not created or the tree may not be properly
displayed.
2) Suspicious behaviors executed in the shared folders will not be visually
displayed.
3) If a mount point for a USB memory stick does not exist, suspicious behaviors
will not be displayed in the tree.
4) The tree can be broken if all logs are not properly collected at the
moment when a backup file for V3 suspicious behaviors is replaced.
Process Tree
The process tree visually shows the relation between
process execution and suspicious behavior in three different types of
tree structure. Process Tree shows the additional behaviors as well as
V3 engine detections. The additional behavior information is shown in
gray.
Click the system, file, process or registry in the
process tree to view the detailed information. You can also block network,
collect artifact, terminate process or search for or gather a file from
Respond.
Configuration for Process Tree
- Display Settings: You can have three different
types of display such as Expanding from left
to right, dropping down (wide) and dropping down (narrow).
Refer to Display Settings for Process
Tree for details about tree configuration.
- Expand/Collapse: You can expand
or collapse the tree structure using
the required menu.
- Icons: The icons used in the process tree indicate
the following information:
- Process
(
): Displays a behavior for a process
in the process tree.
- File
(
): Displays a behavior for a file in
the process tree.
- Network(
):
Displays a behavior for the network in the process tree.
- Registry
(
): Displays a behavior for the registry
in the process tree.
- System
(
): Displays a behavior for a system in
the process tree.
Agent System
Click the system icon in the tree process to display the information
for the detected agent information in the right side of the page. You
can run commands such as completely network
intrusion prevention, collecting AhnReport and artifact to respond to
the detected systems.
Click the icon (
)
next to a system name to move to Detection >
Agent.
- Respond; You can run commands such as network intrusion prevention,
collecting AhnReport
and artifact to respond to the detected agent systems.
- Block Network: Runs
a command to completely block the network connection for the detected
agent systems. The agent system, which received the network block
command will be blocked for network access. If the V3 personal firewall
is enabled in agent systems, the network block command can be run
in real-time. Network block prevents a spread of a malicious code
by blocking the network connection until a root cause for abnormal
traffic generated in an agent system is found. If it is concluded
that there is no agent system issue, the network
block can be disabled.
- Collect AhnReport:
Runs a command to collect AhnReport for the detected agent systems.
AhnReport collects the information from the file, registry, system,
network, hardware, installed program and timeline. If a command for
collecting AhnReport is run, the timeout settings can be configured.
For example, if the timeout is specified for 20 minutes and there
is no agent response for 20 minutes, it will be determined that the
command is not properly delivered.
- Collect Artifact:
Runs a command to collect Artifact for the detected agent systems.
Collects the traces created by using the operating system or application
from Collect Artifact. Also collects the logs, history, timeline and
registry information. View the details for collecting artifact in
Collect Artifact.
Default items:
Collects the default items from EAC (Endpoint Artifacts Collector).
Also collects the process, system, network, hardware, program, timeline,
etc for the default items.
User-defined items:
Collects the required artifact
only by writing the YAML syntax.
Refer to Collecting
User-Defined Artifact for writing the YAML syntax.
- Computer Name: Displays a computer name of a
detected agent system.
- IP Address: Displays an IP address of a detected
agent system.
- Operating System: Displays an operating system
of a detected agent system.
- V3 Product: Displays the V3 program installed
in a detected agent system.
- Engine Version: Displays the V3 engine version
installed in a detected agent system.
- Last Manual Scan: Displays the last date for
the V3 manual scan run in an agent system.
Process (
)
Click the Process icon in the tree process to display the information
for the detected Process in the right side of the page. You can run a command
for Terminate Process to respond to a detected
process.
Respond; Runs a command to terminate
a process, search for a file or collect a file based on the detected
process information.
Terminate Process: Terminates a detected
process. Click Terminate Process to run a command for terminating
a process.
- Process Name: Displays a detected process name.
Process ID: Displays a detected process ID
(PID).
File Path: Displays a detected process path.
Hash value: Displays a hash value of a detected
process.
- Detection Time: Displays the time when a process
was detected.
Note
To view the command status
for file search and file
collection, select Search for
File or Collect File under
Response.
File (
)
Click the Process icon in the process tree to display the information
for the detected file in the right side of the page. Run a command for
Search for File or Collect
File to respond
to a detected file. Click the icon (
) next to a file name to move to
Detection > File.
- Respond:
Searches for or collects a file based on the detected file information.
- Search
for File: Searches for
a file using the
detected file information. Files
can be searched
using domain/group, agent or IP range. The file search results
are displayed in Respond
> Search for File.
- Collect
File: Runs a command to collect a file. Click
Collect
File and then a message saying ”Do you want
to collect the selected file?” will appear.
Click Yes
to run a command to collect a file to an agent system. The command
results for collecting a file
are displayed in Respond
> Collect File.
- File Name: Displays a detected file name.
- Hash Value (MD5): Displays the MD hash value
for a detected file.
- File Size (bytes): Displays a detected file
size. The fie size unit is bytes.
- File Path: Displays a detected file path.
- Detection Time: Displays the time when a file
was detected.
Network (
)
Click the network icon in the process tree to display the information
for the detected the network in the right side of the page. No response
is available in the network information,
- Host Address: Displays a host address accessing
the network.
- IP Address: Displays an IP address accessing
the network.
- Port No.: Displays an IP address accessing the
network.
- URL: Displays an URL information accessing the
network.
Registry (
)
Click the Registry icon in the process tree to display the information
for the detected registry in the right side of the page. No response is
available in the registry information,
- Key Name: Displays an accessed registry key.
- Value: Displays a value name under an accessed
registry key.
- Data: Displays data shown under an accessed
registry key.
Details
You can view the detailed information about the detected behaviors.
The detailed information shows default information,
detailed behaviors and IOC detection information.
Default Information
Displays the default information such as malicious property or hash
value.
- Name: Displays a malicious code name.
- Diagnosis: Displays a detected item is malicious
or not. If the detected item is determined to be malicious or suspicious,
the diagnosis result will be shown to be Malicious
or Suspicious.
- Hash value: Displays a file hash value
Behavior Information
Displays the detailed behavior information about the individual detection.
The following information shows the details about process execution and
suspicious behaviors. Click
next to the detailed behavior information to select the required information
such as View in order of occurrence, View in recent
action order or View by behavior type.
Refer to Detection Behavior
for detection details.
- View
in recent action order: Displays a detected behavior in time order.
- View
in recent action order Displays a detected behavior from the most
recently occurred one.
- View
by behavior type: Displays by categorized behavior type.
- Total: Displays the
all behaviors about file/registry/network.
Process: Displays
a behavior only about a process.
File: Displays
a behavior only about a file.
Registry: Displays
a behavior only about a registry.
Network: Displays
a behavior only about a network.
- Occurred Time: Displays the behavior occurred
time. (ex: 2019-04-16 10:32:23)
- Type: Categorizes file/process/registry/network.
Note
Depending on a behavior type, the information displayed
in [Process Information] and [Target]
may differ.
- [Process Information]
- File Name: Displays a file name related to
the detected behavior.
- Process ID: Displays a process ID related to
the detected behavior.
- Hash value: Displays a file hash value related
to the detected behavior. The hash value identifies the file information.
- File Path: Displays a file path related to
the detected behavior.
- File Size (bytes): Displays a file size related
to the detected behavior.
- [Target]
- File Name: Displays a file name, which a file
or a process accesses.
- Hash value: Displays a file hash value.
- Process ID: Displays a process ID of a file.
- File Path: Displays a file path.
- Cmd line: Indicates a command required to run
a file.
- File Size (bytes): Displays a file size.
- Remote IP Address: Displays a IP address, which
a file or a process remotely accesses.
- Remote Port No.: Displays a port, which a file
or a process remotely accesses.
- Local IP Address: Displays a local IP address,
which a file or a process remotely accesses.
- Local Port No.: Displays a local port, which
a file or a process remotely accesses.
- Host Address: Displays a host address for network
connection.
- IP Address: Displays an IP address used when
a behavior such as connecting the network occurs.
- Port No.: Displays a port number used when
a behavior such as connecting the network occurs.
- URL: Displays a URL used when a behavior such
as connecting the network occurs.
IOC Detection Information:
Displays the detections made by IOC detection rules uploaded. To make
a detection using IOC, the IOC files should be uploaded from IOC.
- Detected IOC Type: Displays the IOC rule information,
which detects a behavior. Upload the IOC files in the STIX format
to detect a behavior.
- Description: Displays the detailed about detected
IOC. Displays the all behaviors about file/registry/network.
Note
STIX is compatible for the IOC file format. STIX 1.2 supports
file, address object type and URL object type.
- Expand Right: Expands the tree from left to
right.

- Expand Down (Wide): Expands the tree from up
to down.

- Expand Down (Narrow): Expands the tree from
middle to down. The space between the objects is narrow.
Note
You can view the detections for suspicious behaviors in
Detection Behavior.