Ransomware Investigation & Response Runbook

SOC & DFIR Operations Guide

Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access


Overview & Scope

This runbook provides standardised procedures for investigating and responding to ransomware attacks across the hybrid enterprise environment. Ransomware incidents require rapid, coordinated response to minimise damage, preserve evidence, and enable recovery. Time is critical—every minute of delay can result in additional encrypted systems and data loss.

What is Ransomware?

Ransomware is malicious software that encrypts files and systems, rendering them inaccessible until a ransom is paid. Modern ransomware operations (often called "Big Game Hunting") typically involve:

  • Data exfiltration before encryption (double extortion)

  • Threat to publish stolen data if ransom not paid

  • Targeting of backups to prevent recovery

  • Domain-wide encryption via compromised credentials

  • Ransomware-as-a-Service (RaaS) affiliate models

Key Statistics:

  • Average downtime: 21+ days

  • Average ransom demand: $200,000 - $5,000,000+

  • Recovery costs often exceed ransom amount

  • 80% of victims who pay are attacked again

  • Data exfiltration occurs in 70%+ of cases

Environment Architecture

Component
Role in Ransomware Response

Microsoft Defender for Endpoint (MDE)

Ransomware detection, device isolation, live response

Microsoft Defender for Identity (MDI)

Lateral movement detection, credential compromise

Microsoft Sentinel

Correlation, automated response, hunting

Active Directory

Credential reset, KRBTGT rotation, GPO recovery

Microsoft Entra ID

Cloud identity protection, session revocation

Backup Systems

Recovery source validation, integrity verification

Palo Alto Prisma Access

Network isolation, C2 blocking

Ransomware Attack Lifecycle

Ransomware Families Reference

Prevalent Ransomware Groups (2024-2025)

Group/Ransomware
Characteristics
TTPs

LockBit 3.0

RaaS, fast encryption, data leak site

GPO deployment, PsExec

BlackCat/ALPHV

Rust-based, cross-platform, triple extortion

Cobalt Strike, ExMatter

Cl0p

Targets file transfer appliances (MOVEit, GoAnywhere)

Zero-day exploitation

Royal/BlackSuit

Rebranded Conti members, partial encryption

Callback phishing, BatLoader

Play

Intermittent encryption, no RaaS

AdFind, SystemBC

Akira

Targets VPNs, Linux/VMware variants

Cisco VPN exploitation

Black Basta

Conti successor, QakBot delivery

QakBot, Cobalt Strike

Rhysida

Healthcare/education targeting

Phishing, Cobalt Strike

Medusa

Data leak blog, negotiation portal

RDP brute force

8Base

SMB targeting, Phobos variant

Phishing, SmokeLoader

Ransomware File Extensions

Extension
Ransomware Family

.lockbit, .lockbit3

LockBit

.alphv, .ALPHV

BlackCat

.clop, .Cl0p

Cl0p

.royal

Royal

.play

Play

.akira

Akira

.basta

Black Basta

.rhysida

Rhysida

.medusa

Medusa

.8base

8Base


Detection Sources & Indicators

Log Sources Matrix

Platform
Log Table
Ransomware Detection Data

Defender for Endpoint

DeviceAlertEvents

Ransomware behavior alerts

Defender for Endpoint

DeviceFileEvents

Mass file modifications

Defender for Endpoint

DeviceProcessEvents

Encryption processes, deletion tools

Defender for Endpoint

DeviceEvents

Shadow copy deletion, service tampering

Defender for Identity

IdentityLogonEvents

Mass lateral movement

Defender for Identity

IdentityDirectoryEvents

DCSync, credential access

Sentinel

SecurityAlert

Correlated ransomware alerts

Windows Events

SecurityEvent

Logon events, service installation

Windows Events

Event (System)

Service creation, VSS events

Prisma Access

PaloAltoPrismaAccess

C2 communication, exfiltration

Pre-Encryption Indicators (Warning Signs)

Days/Weeks Before Encryption

Indicator
Description
Detection Source

Cobalt Strike beacons

C2 framework activity

MDE alerts, network

Mimikatz execution

Credential dumping

MDE process events

DCSync attacks

Domain replication from non-DC

MDI alerts, Event 4662

Mass reconnaissance

AdFind, BloodHound, network scans

MDE process events

Lateral movement spikes

RDP, SMB, WinRM to many systems

MDI, MDE logon events

New admin accounts

Unauthorized privileged accounts

AD audit logs

Disabled security tools

AV/EDR tampering

MDE health alerts

Backup access/deletion

Targeting backup systems

Backup system logs

Hours Before Encryption

Indicator
Description
Detection Source

Shadow copy deletion

vssadmin, wmic commands

MDE process events

GPO creation/modification

Ransomware deployment prep

AD audit logs

PsExec deployment

Mass tool deployment

MDE, Event 7045

Security tool uninstall

Removing defenses

MDE events

bcdedit modifications

Disabling recovery options

MDE process events

Service account usage spike

Automation of deployment

Logon events

Scheduled tasks creation

Timed ransomware execution

Event 4698

Active Encryption Indicators

Indicator
Description
Detection Source

Mass file modifications

Thousands of files changed/renamed

MDE DeviceFileEvents

Ransom note creation

README, DECRYPT, RECOVER files

MDE DeviceFileEvents

Known ransomware processes

Identified encryption binaries

MDE alerts

High CPU/disk usage

Encryption activity

Performance monitoring

File extension changes

Mass extension modifications

MDE DeviceFileEvents

User complaints

Unable to access files

Service desk

Application failures

Systems becoming unavailable

Monitoring systems

Critical Detection Rules

MDE Alert Categories for Ransomware

Alert Category
Severity
Action

Ransomware

High/Critical

Immediate response

Suspicious credential access

High

Investigate immediately

Tampering with security

High

Investigate immediately

Suspicious process activity

Medium-High

Investigate within 1 hour

Lateral movement

Medium-High

Investigate within 1 hour

Data exfiltration

High

Investigate immediately


Investigation Workflows

Ransomware Incident Response Phases


Phase 1: Detection & Initial Response

Timeline: 0-15 minutes Objective: Validate the ransomware incident and mobilise response.

Step 1.1: Alert Validation

  1. Confirm alert is ransomware (not false positive)

  2. Identify alerting source and detection logic

  3. Determine affected system(s) from initial alert

  4. Check for ransomware indicators:

    • Known ransomware file extensions

    • Ransom notes present

    • Mass file modification alerts

    • Shadow copy deletion

Step 1.2: Initial Scope Assessment

  1. Query for related alerts in last 24-72 hours

  2. Identify potentially related systems

  3. Check for Domain Controller involvement

  4. Assess criticality of affected systems

  5. Determine if encryption is active or complete

Step 1.3: Incident Declaration

Condition
Declaration

Single workstation, contained

Security Incident - Medium

Multiple workstations affected

Security Incident - High

Server infrastructure affected

Major Incident

Domain Controllers affected

Critical Incident / Disaster

Active encryption spreading

Critical Incident / Disaster

Step 1.4: Activate Incident Response

  1. Notify IR Team Lead immediately

  2. Establish communication channel (out-of-band if needed)

  3. Begin incident documentation

  4. Alert leadership per escalation matrix

  5. Engage external IR support if needed (Critical/Major)

Initial Response Checklist


Phase 2: Containment

Timeline: 15-60 minutes

copies/backupsObjective: Stop the spread of ransomware and preserve evidence.

⚠️ Critical Decision: Containment must be fast but measured. Premature actions may tip off attackers or destroy evidence. However, delay costs encrypted systems.

Step 2.1: Network Containment

Immediate Network Actions

Priority
Action
Method
Risk

1

Isolate confirmed infected systems

MDE Device Isolation

Low

2

Block known C2 infrastructure

Prisma Access / Firewall

Low

3

Isolate suspected systems

MDE Device Isolation

Medium

4

Segment affected network zones

Firewall rules

Medium

5

Block lateral movement ports

Emergency firewall rules

High (business impact)

6

Disable external access

VPN/RDP shutdown

High (business impact)

Network Isolation Decision Tree

Step 2.2: Endpoint Containment

Step 2.3: Identity Containment

Immediate Identity Actions

Action
When
Method

Disable compromised accounts

Confirmed compromise

AD + Entra ID

Reset compromised passwords

Confirmed compromise

AD + Entra ID

Revoke active sessions

All suspicious accounts

Entra ID

Disable service accounts

If used in attack

AD (with caution)

Block suspicious IPs

Attacker infrastructure

Conditional Access

Account Containment Commands

Step 2.4: Preserve Evidence

⚠️ Critical: Do not wipe or reimage systems until evidence is preserved!

Evidence Type
Collection Method
Priority

Memory dumps

MDE Live Response, WinPmem

High

Ransomware samples

MDE quarantine, manual collection

High

Ransom notes

Copy to evidence storage

High

Event logs

Export before rotation

High

MFT/filesystem metadata

Forensic tools

Medium

Network captures

PCAP from network devices

Medium

Step 2.5: Protect Backups

Action
Purpose

Verify backup isolation

Ensure backups not accessible to attackers

Disable backup network access

Prevent backup encryption/deletion

Validate backup integrity

Confirm backups are usable

Create backup of backups

Protect recovery capability

Document backup status

Record what's available for recovery

Containment Checklist


Phase 3: Investigation

Timeline: Ongoing (parallel to containment/eradication) Objective: Determine full scope, identify root cause, and map impact.

Step 3.1: Identify Patient Zero

  1. Query for earliest ransomware indicators

  2. Trace back from encrypted systems

  3. Identify initial access vector

  4. Document initial compromise timeline

  5. Determine attacker dwell time

Step 3.2: Map Lateral Movement

  1. Query all lateral movement for compromised accounts

  2. Identify all systems accessed

  3. Map credential usage patterns

  4. Document administrative access points

  5. Identify Domain Controller access

Step 3.3: Determine Full Scope

Question
Investigation Method

How many systems encrypted?

MDE query, file share scan

Which systems were accessed?

Logon event analysis

What accounts compromised?

Authentication analysis

Was data exfiltrated?

Network analysis, cloud logs

Are backups affected?

Backup system verification

Are DCs compromised?

DC forensic analysis

Step 3.4: Assess Data Exfiltration

  1. Review network traffic for large outbound transfers

  2. Check cloud storage activity

  3. Review known exfiltration tools

  4. Analyse pre-encryption timeline

  5. Document potential data exposure

Step 3.5: Identify Ransomware Variant

  1. Collect ransom notes

  2. Analyse encrypted file extensions

  3. Check ransomware identification services

  4. Research variant-specific TTPs

  5. Check for available decryptors

Investigation Documentation Template


Phase 4: Eradication

Timeline: After containment confirmed

Objective: Remove all attacker presence from the environment.

⚠️ Warning: Do not begin eradication until containment is complete. Partial eradication may alert attackers and trigger destructive actions.

Step 4.1: Credential Reset Strategy

Tiered Credential Reset

Tier
Accounts
When
Method

Tier 0

KRBTGT, Domain Admin, Enterprise Admin

Immediately if DC compromised

Scripted reset

Tier 1

All privileged accounts

After Tier 0

Scripted reset

Tier 2

Service accounts

After Tier 1

Coordinated reset

Tier 3

All user accounts

After Tier 1-2

Forced reset at logon

KRBTGT Reset Procedure

⚠️ Critical: KRBTGT reset affects all Kerberos authentication. Plan carefully.

Domain Admin Reset

Step 4.2: Malware Removal

Per-System Eradication

Step
Action
Verification

1

Run full AV scan

MDE full scan

2

Remove persistence mechanisms

Registry, services, tasks

3

Remove malware files

All identified binaries

4

Remove attacker tools

Cobalt Strike, Mimikatz, etc.

5

Verify removal

Second scan, manual check

Persistence Mechanism Removal

Step 4.3: GPO Cleanup

Step 4.4: Validate Eradication

Validation Check
Method
Pass Criteria

Full endpoint scan

MDE scan all systems

No detections

Persistence check

Manual/script verification

No persistence found

Network monitoring

24-48 hour monitoring

No C2 callbacks

Credential verification

Test authentication

Clean authentication

IOC search

Hunt for known IOCs

No matches

Eradication Checklist


Phase 5: Recovery

Timeline: After eradication validated

Objective: Restore systems and data from clean backups.

Step 5.1: Recovery Prioritisation

Priority
Systems
Recovery Method
Timeline Target

P1

Domain Controllers

Rebuild or verified backup

Immediate

P2

Authentication infrastructure

Rebuild or verified backup

Immediate

P3

Critical business applications

Backup restore

24-48 hours

P4

File servers

Backup restore

48-72 hours

P5

User workstations

Reimage + backup data

As capacity allows

Step 5.2: Backup Validation

⚠️ Critical: Validate backups are clean before restoration!

Validation Step
Method
Purpose

Isolate backup

Air-gapped restoration

Prevent infection

Scan backup

AV/EDR scan

Detect malware

Test restore

Restore to isolated VM

Verify integrity

Date verification

Confirm backup date

Ensure pre-infection

Application test

Test functionality

Verify usability

Step 5.3: Domain Controller Recovery

If DCs Are Compromised

Option
When to Use
Complexity

Restore from backup

Clean backup available, <24hrs old

Medium

Rebuild DC

No clean backup, or backup old

High

Forest recovery

Multiple/all DCs compromised

Very High

DC Rebuild Procedure (Summary)

  1. Build new DC on clean hardware/VM

  2. Promote to Domain Controller

  3. Wait for replication

  4. Seize FSMO roles if needed

  5. Demote compromised DCs

  6. Remove compromised DC metadata

  7. Validate AD functionality

Step 5.4: System Recovery Procedures

Server Recovery

Workstation Recovery

Step 5.5: Data Recovery

Data Type
Recovery Method
Validation

File shares

Restore from backup

Spot check + AV scan

Databases

Restore from backup

Integrity check + test

Email

PST restore or O365 recovery

Verify mailbox function

Cloud data

Point-in-time recovery

Verify access

Application data

Application-specific restore

Application testing

Recovery Checklist


Phase 6: Post-Incident Activities

Timeline: After recovery complete

Objective: Learn from the incident and improve defences.

Step 6.1: Post-Incident Review (PIR)

Topic
Questions to Address

Detection

How was the incident detected? How long was dwell time?

Response

What worked well? What could be improved?

Containment

Was containment fast enough? What slowed it down?

Eradication

Was eradication complete? Any reinfection?

Recovery

How long did recovery take? Were backups adequate?

Communication

Was communication effective? Any gaps?

Step 6.2: Documentation Requirements

Document
Contents
Audience

Technical Report

Full technical details, IOCs, timeline

Security team

Executive Summary

Business impact, costs, key decisions

Leadership

Legal Report

Evidence, timeline for litigation

Legal counsel

Regulatory Report

Data breach details if applicable

Regulators

Insurance Claim

Costs, timeline, evidence

Cyber insurance

Step 6.3: Hardening Recommendations

Category
Common Improvements

Identity

MFA everywhere, privileged access management, reduced admin accounts

Endpoint

EDR coverage, application control, attack surface reduction

Network

Segmentation, east-west traffic monitoring, zero trust

Backup

Air-gapped backups, immutable storage, tested restoration

Detection

Improved alerting, UEBA, deception technology

Response

Updated runbooks, tabletop exercises, IR retainer

Step 6.4: Regulatory Notifications

Regulation
Notification Requirement
Timeline

GDPR

Data Protection Authority if EU data

72 hours

HIPAA

HHS if PHI involved

60 days

State Breach Laws

State AG, affected individuals

Varies (typically 30-60 days)

SEC

Material cybersecurity incidents

4 business days

PCI-DSS

Card brands, acquirer

Immediately

CISA

Critical infrastructure

72 hours


KQL Query Cheat Sheet

Ransomware Detection Queries

Mass File Modification Detection

Known Ransomware Extensions

Ransom Note Detection

Shadow Copy Deletion

Security Tool Tampering


Pre-Encryption Activity Detection

Credential Dumping Tools

Reconnaissance Tools

PsExec and Remote Execution

Lateral Movement Velocity


Active Encryption Detection

Real-Time File Encryption Alert

Encryption Process Identification

Affected Systems Dashboard


Post-Compromise Investigation

Timeline for Affected Device

Account Activity Analysis

C2 Communication Detection


Backup and Recovery Queries

Backup System Access

VSS Activity Monitoring


Response Actions & Commands

Immediate Response Actions

MDE Device Isolation

Network Containment via Prisma Access

Mass Account Disable

Evidence Collection

Collect Ransomware Artifacts

Memory Acquisition


Quick Reference Cards

Ransomware Response Checklist

Immediate Actions (First 15 Minutes)

Containment Actions (15-60 Minutes)

Investigation Actions (Ongoing)

Eradication Actions (After Containment)

Recovery Actions (After Eradication)

Ransomware Variant Quick Reference

If You See...
Likely Ransomware
Known For

.lockbit3 extension, red wallpaper

LockBit 3.0

Fast encryption, RaaS

.ALPHV extension, rust-based

BlackCat/ALPHV

Cross-platform

Targets MOVEit/GoAnywhere

Cl0p

Zero-day exploitation

.royal extension

Royal/BlackSuit

Partial encryption

.play extension

Play

No RaaS, stealth

.akira extension, retro theme

Akira

VPN targeting

.basta extension

Black Basta

QakBot delivery

Critical Contacts Template

Role
Name
Phone
Email

IR Team Lead

CISO

Legal Counsel

External IR Firm

Cyber Insurance

FBI Field Office

PR/Communications


Escalation Matrix

Severity Classification

Severity
Criteria
Response

🔴 Critical

Active encryption spreading, DCs affected, >50 systems

All hands, external IR

🟠 High

Encryption contained, multiple servers affected

Full IR team

🟡 Medium

Single server or multiple workstations

Tier 2 + Tier 1

🟢 Low

Single workstation, rapidly contained

Tier 1 with Tier 2 backup

Escalation Timeline

Time
Actions

0-15 min

IR team lead notified, incident declared

15-30 min

CISO notified, containment in progress

30-60 min

Executive leadership briefed

1-4 hours

External IR engaged (if needed), Legal notified

4-24 hours

Board notification (if critical), insurance notified

24-72 hours

Regulatory notification assessment

Communication Templates

Initial Executive Notification

Status Update Template


MITRE ATT&CK Mapping

Pre-Ransomware Techniques

Tactic
Technique
ID
Detection

Initial Access

Phishing

T1566

MDO alerts

Initial Access

External Remote Services

T1133

VPN/RDP logs

Initial Access

Valid Accounts

T1078

SigninLogs anomalies

Execution

PowerShell

T1059.001

Script block logging

Execution

Command Interpreter

T1059.003

Process command lines

Persistence

Scheduled Task

T1053.005

Event 4698

Persistence

Registry Run Keys

T1547.001

Registry monitoring

Privilege Escalation

Valid Accounts

T1078

Privileged logons

Defense Evasion

Disable Security Tools

T1562.001

MDE health alerts

Credential Access

OS Credential Dumping

T1003

MDE alerts, process events

Credential Access

Kerberoasting

T1558.003

Event 4769

Discovery

Domain Trust Discovery

T1482

Nltest, AD queries

Discovery

Network Share Discovery

T1135

Net view commands

Lateral Movement

Remote Services

T1021

Logon events

Lateral Movement

SMB/Admin Shares

T1021.002

Event 5140

Collection

Data from Local System

T1005

File access

Exfiltration

Exfil Over Web Service

T1567

Network traffic

Ransomware Execution Techniques

Tactic
Technique
ID
Detection

Impact

Data Encrypted for Impact

T1486

Mass file modification

Impact

Inhibit System Recovery

T1490

VSS deletion, bcdedit

Impact

Service Stop

T1489

Service control events

Impact

System Shutdown/Reboot

T1529

System events


Appendix: Additional Resources

Ransomware Identification Resources

Resource
URL
Purpose

ID Ransomware

https://id-ransomware.malwarehunterteam.com

Identify variant by sample

No More Ransom

https://www.nomoreransom.org

Free decryptors

Ransomwhere

https://ransomwhe.re

Ransom payment tracking

CISA Ransomware Guide

https://www.cisa.gov/stopransomware

Official guidance

Decryptor Resources

Source
URL

No More Ransom Project

https://www.nomoreransom.org/en/decryption-tools.html

Emsisoft Decryptors

https://www.emsisoft.com/ransomware-decryption-tools/

Kaspersky No Ransom

https://noransom.kaspersky.com

Avast Decryptors

https://www.avast.com/ransomware-decryption-tools

Topic
Resource

FBI IC3

https://www.ic3.gov (report ransomware)

CISA

https://www.cisa.gov/stopransomware

OFAC Sanctions

Check before any ransom consideration

State Breach Laws

Varies by state

Ransom Payment Considerations

⚠️ Important Legal Note: This section is for awareness only. Ransom payment decisions require legal, executive, and potentially law enforcement consultation.

Factor
Consideration

OFAC Sanctions

Payment to sanctioned entities is illegal

No Guarantee

Payment doesn't guarantee decryption

Repeat Targeting

Paying may invite future attacks

Data Already Leaked

Payment won't prevent data publication

Decryptor Availability

Free decryptors may exist

Backup Recovery

Recovery without payment may be possible

Insurance Coverage

Policy may have payment restrictions

Legal Liability

Consider all legal implications

Recommendation: Exhaust all recovery options before considering payment. Always involve legal counsel and potentially law enforcement.


🚨 CRITICAL REMINDER: Ransomware incidents are time-critical. Every minute of delay can result in additional encrypted systems. However, hasty actions can destroy evidence or alert attackers. Balance speed with precision. When in doubt, isolate first, investigate second. NEVER pay ransom without exhausting all other options and consulting legal counsel. Most importantly—test your backups regularly; they are your primary recovery mechanism.

Last updated