Hello,
I've been using the following query for some time to figure out the processes related to a network connection (getting suspicious network connection from other security products as input):
# $$startTime$$ - Date # $$endTime$$ - Date # $$uri$$ - String # $$source_or_destination_ip$$ - String SELECT datetime(shj.time,'unixepoch','localtime') AS LocalTimeStamp, datetime(shj.processStartTime,'unixepoch','localtime') AS processStartTime, * FROM sophos_http_journal shj INNER JOIN sophos_process_journal spj ON shj.sophosPID = spj.sophosPID LEFT JOIN users ON sid = uuid WHERE (source LIKE '%$$source_or_destination_ip$$%' OR destination LIKE '%$$source_or_destination_ip$$%') AND LOWER(shj.url) LIKE LOWER('%$$uri$$%') AND shj.time >= $$startTime$$ AND shj.time <= $$endTime$$
What I noticed is that some network connections are proxied by the Sophos Web Intelligence Engine: swi_fc.exe
However I would like to figure out what the original process triggering the webrequest was (is it a powershell script, chrome edge, etc). Since you loose the original process tree as well as the original Sophos PID it's pretty hard to do a proper analysis from here.
I'm happy to provide additional detail if needed.
KR, reg1nleifr