Malware Investigation Process
MALWARE INVESTIGATION
Identification
We are monitoring SIEM sentinel console 24/7. Once incident is triggered assign to our self and Change the status from NEW TO ACTIVE
2.Gather Information
Finding the incident details in the incident page .
After status change open the Incident and
Open the Entities and collect the Host Name & Check in the EDR(Endpoint Detection Response) with the Collected Host Name.
Details Gathered
Host name
Username /account
Filename
Hash value
User email ID
Detection : AV
Primary AV : Microsoft Defender
Device action : Prevented/quarantined
File path
Device os : Linux Ubuntu
Investigation
After collecting the all the details start the Investigation
Check the Reputation of Hash value in various threat intelligence tools:
Virus total
JOE sandbox
Valkyrie comodo
IBM xforce
Anyrun
Paste the Hash value of above mentioned applications & check for malicious activity
Check the device action is leftalone or quarantined ,
Check the root cause for the Malware, Whether it has come from download, Outlook, External device or it was there in the machine itself.
By checking the Timeline of EDR we can find the RCA for malware
I will Check the EDR Alert story and timeline story for the details , Connect with the user and check the abnormalities in the machine
What are the programs running and any new programs installed after the alert
What are all services running and any suspicious service running
Check the process running in the machine
Check autorun or startup
Check any CNC connection by using netstat –n , Check ARP checklist by using in arp/a in a command prompt
Check the DNS cache details from the machine
Check the configuration of the machine using ipconfig in command prompt
Clear the credential manager for both web and windows
Check any Extensions created , delete the unwanted extensions
Check for any other DNS suffixes Run the Full Av on demand scan
Containment
If any suspicious Disconnect from the network
Remediation
Delete the file from the file path, Run AV scan If it has come from the email: Check how many Members got the same email, Check all those machine
If it downloaded from any website , Block that Website in Proxy server
Close The Incident
Once you have resolved a particular incident (for example, when your investigation has reached its conclusion), you should set the incident’s status to Closed. When you do so, you will be asked to classify the incident by specifying the reason you are closing it. This step is mandatory. Click Select classification and choose one of the following from the drop-down list
True Positive - suspicious activity
Benign Positive - suspicious but expected
False Positive - incorrect alert logic
False Positive - incorrect data
Undetermined
Screenshot that highlights the classifications available in the Select classification list
After choosing the appropriate classification, add some descriptive text in the Comment field. This will be useful in the event you need to refer back to this incident. Click Apply when you’re done, and the incident will be closed.
Comments