HIGH WildFire Malware
Prevented (Post Detected)
ID: #308
|
Detected: 2026-01-01 04:10:43
|
Malware
Alert Overview
Suspicious executable detected
Unclassified
XDR Agent
New
DS:PANW/XDR Agent
DOM:Security
Host Information
BOOK-R0BE6S1NC3
N/A
00:15:5d:e5:a2:15
Process Information
File Event
Actor Process (Executor)
| Process Name | splunkd.exe |
|---|---|
| Path | C:\Users\Public\splunkd.exe |
| PID | 24356 |
| SHA256 |
21a82bc892ffbe9e9351528ca53dde9b4c05c3d35a8696b15c5ff2a311533e6f
VT
|
| MD5 | d9c56f6cf62527a6eb22b271f00700b9 |
"C:\Users\Public\splunkd.exe" -server http://localhost:8888 -group red
Parent Process (Causality)
| Process Name | WindowsTerminal.exe |
|---|---|
| Path | C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.23.13503.0_x64__8wekyb3d8bbwe\WindowsTerminal.exe |
| SHA256 |
aba55eb3398b290ebd93ae83b34a9e51d6b5763ac8c0172b39e8a4b6f53b9f8d
VT
|
"C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.23.13503.0_x64__8wekyb3d8bbwe\WindowsTerminal.exe"
File Artifacts
| File Name | splunkd.exe |
|---|---|
| Path | C:\Users\Public\splunkd.exe |
| SHA256 |
21a82bc892ffbe9e9351528ca53dde9b4c05c3d35a8696b15c5ff2a311533e6f
VT
|
Severity Analysis
HIGH
High priority investigation needed
Summary
Events
1
IP Addresses
3
Tags
2
File Artifacts
Yes
Network Artifacts
No
Registry Artifacts
No
Analyst Verdict