ScreenConnect not identified as network application
A user opened a malicious ScreenConnect MSI - it appears that it tried to download part of the payload from a site that Palo has flagged as malware. This may have prevented further infection.
The site was orlixan cfd - all this traffic was sink holed and there is no screenconnect app traffic on the firewall.
I'm trying to confirm the user clicked the MSI to install the malicious ScreenConnect and then reached out to download the payload from the malware site, but was unsuccessful and no traffic for ScreenConnect was detected by the Palo since it failed and sink holed the malware domain.
Unfortunately the user not aware if they opened or the MSI was at all. The analysis shortly after the download.