Scenario 1: An attacker sends a phishing email containing a link to a malicious website. The user clicks the link, and a small binary file is downloaded and executed. The detection is triggered by the unusual outbound network connection to a known C&C server and the execution of a new, unknown process.
Scenario 2: During a penetration test, the security team uses a stage loader to simulate an initial malware delivery. The detection is triggered, and the activity is verified as part of the scheduled assessment.