Ransomware Investigation & Response Runbook
SOC & DFIR Operations Guide
Environment: Windows AD | Microsoft 365 | Defender XDR | Sentinel | Entra ID | Palo Alto Prisma Access
Overview & Scope
This runbook provides standardised procedures for investigating and responding to ransomware attacks across the hybrid enterprise environment. Ransomware incidents require rapid, coordinated response to minimise damage, preserve evidence, and enable recovery. Time is critical—every minute of delay can result in additional encrypted systems and data loss.
What is Ransomware?
Ransomware is malicious software that encrypts files and systems, rendering them inaccessible until a ransom is paid. Modern ransomware operations (often called "Big Game Hunting") typically involve:
Data exfiltration before encryption (double extortion)
Threat to publish stolen data if ransom not paid
Targeting of backups to prevent recovery
Domain-wide encryption via compromised credentials
Ransomware-as-a-Service (RaaS) affiliate models
Key Statistics:
Average downtime: 21+ days
Average ransom demand: $200,000 - $5,000,000+
Recovery costs often exceed ransom amount
80% of victims who pay are attacked again
Data exfiltration occurs in 70%+ of cases
Environment Architecture
Microsoft Defender for Endpoint (MDE)
Ransomware detection, device isolation, live response
Microsoft Defender for Identity (MDI)
Lateral movement detection, credential compromise
Microsoft Sentinel
Correlation, automated response, hunting
Active Directory
Credential reset, KRBTGT rotation, GPO recovery
Microsoft Entra ID
Cloud identity protection, session revocation
Backup Systems
Recovery source validation, integrity verification
Palo Alto Prisma Access
Network isolation, C2 blocking
Ransomware Attack Lifecycle
Ransomware Families Reference
Prevalent Ransomware Groups (2024-2025)
LockBit 3.0
RaaS, fast encryption, data leak site
GPO deployment, PsExec
BlackCat/ALPHV
Rust-based, cross-platform, triple extortion
Cobalt Strike, ExMatter
Cl0p
Targets file transfer appliances (MOVEit, GoAnywhere)
Zero-day exploitation
Royal/BlackSuit
Rebranded Conti members, partial encryption
Callback phishing, BatLoader
Play
Intermittent encryption, no RaaS
AdFind, SystemBC
Akira
Targets VPNs, Linux/VMware variants
Cisco VPN exploitation
Black Basta
Conti successor, QakBot delivery
QakBot, Cobalt Strike
Rhysida
Healthcare/education targeting
Phishing, Cobalt Strike
Medusa
Data leak blog, negotiation portal
RDP brute force
8Base
SMB targeting, Phobos variant
Phishing, SmokeLoader
Ransomware File Extensions
.lockbit, .lockbit3
LockBit
.alphv, .ALPHV
BlackCat
.clop, .Cl0p
Cl0p
.royal
Royal
.play
Play
.akira
Akira
.basta
Black Basta
.rhysida
Rhysida
.medusa
Medusa
.8base
8Base
Detection Sources & Indicators
Log Sources Matrix
Defender for Endpoint
DeviceAlertEvents
Ransomware behavior alerts
Defender for Endpoint
DeviceFileEvents
Mass file modifications
Defender for Endpoint
DeviceProcessEvents
Encryption processes, deletion tools
Defender for Endpoint
DeviceEvents
Shadow copy deletion, service tampering
Defender for Identity
IdentityLogonEvents
Mass lateral movement
Defender for Identity
IdentityDirectoryEvents
DCSync, credential access
Sentinel
SecurityAlert
Correlated ransomware alerts
Windows Events
SecurityEvent
Logon events, service installation
Windows Events
Event (System)
Service creation, VSS events
Prisma Access
PaloAltoPrismaAccess
C2 communication, exfiltration
Pre-Encryption Indicators (Warning Signs)
Days/Weeks Before Encryption
Cobalt Strike beacons
C2 framework activity
MDE alerts, network
Mimikatz execution
Credential dumping
MDE process events
DCSync attacks
Domain replication from non-DC
MDI alerts, Event 4662
Mass reconnaissance
AdFind, BloodHound, network scans
MDE process events
Lateral movement spikes
RDP, SMB, WinRM to many systems
MDI, MDE logon events
New admin accounts
Unauthorized privileged accounts
AD audit logs
Disabled security tools
AV/EDR tampering
MDE health alerts
Backup access/deletion
Targeting backup systems
Backup system logs
Hours Before Encryption
Shadow copy deletion
vssadmin, wmic commands
MDE process events
GPO creation/modification
Ransomware deployment prep
AD audit logs
PsExec deployment
Mass tool deployment
MDE, Event 7045
Security tool uninstall
Removing defenses
MDE events
bcdedit modifications
Disabling recovery options
MDE process events
Service account usage spike
Automation of deployment
Logon events
Scheduled tasks creation
Timed ransomware execution
Event 4698
Active Encryption Indicators
Mass file modifications
Thousands of files changed/renamed
MDE DeviceFileEvents
Ransom note creation
README, DECRYPT, RECOVER files
MDE DeviceFileEvents
Known ransomware processes
Identified encryption binaries
MDE alerts
High CPU/disk usage
Encryption activity
Performance monitoring
File extension changes
Mass extension modifications
MDE DeviceFileEvents
User complaints
Unable to access files
Service desk
Application failures
Systems becoming unavailable
Monitoring systems
Critical Detection Rules
MDE Alert Categories for Ransomware
Ransomware
High/Critical
Immediate response
Suspicious credential access
High
Investigate immediately
Tampering with security
High
Investigate immediately
Suspicious process activity
Medium-High
Investigate within 1 hour
Lateral movement
Medium-High
Investigate within 1 hour
Data exfiltration
High
Investigate immediately
Investigation Workflows
Ransomware Incident Response Phases
Phase 1: Detection & Initial Response
Timeline: 0-15 minutes Objective: Validate the ransomware incident and mobilise response.
Step 1.1: Alert Validation
Confirm alert is ransomware (not false positive)
Identify alerting source and detection logic
Determine affected system(s) from initial alert
Check for ransomware indicators:
Known ransomware file extensions
Ransom notes present
Mass file modification alerts
Shadow copy deletion
Step 1.2: Initial Scope Assessment
Query for related alerts in last 24-72 hours
Identify potentially related systems
Check for Domain Controller involvement
Assess criticality of affected systems
Determine if encryption is active or complete
Step 1.3: Incident Declaration
Single workstation, contained
Security Incident - Medium
Multiple workstations affected
Security Incident - High
Server infrastructure affected
Major Incident
Domain Controllers affected
Critical Incident / Disaster
Active encryption spreading
Critical Incident / Disaster
Step 1.4: Activate Incident Response
Notify IR Team Lead immediately
Establish communication channel (out-of-band if needed)
Begin incident documentation
Alert leadership per escalation matrix
Engage external IR support if needed (Critical/Major)
Initial Response Checklist
Phase 2: Containment
Timeline: 15-60 minutes
copies/backupsObjective: Stop the spread of ransomware and preserve evidence.
⚠️ Critical Decision: Containment must be fast but measured. Premature actions may tip off attackers or destroy evidence. However, delay costs encrypted systems.
Step 2.1: Network Containment
Immediate Network Actions
1
Isolate confirmed infected systems
MDE Device Isolation
Low
2
Block known C2 infrastructure
Prisma Access / Firewall
Low
3
Isolate suspected systems
MDE Device Isolation
Medium
4
Segment affected network zones
Firewall rules
Medium
5
Block lateral movement ports
Emergency firewall rules
High (business impact)
6
Disable external access
VPN/RDP shutdown
High (business impact)
Network Isolation Decision Tree
Step 2.2: Endpoint Containment
Step 2.3: Identity Containment
Immediate Identity Actions
Disable compromised accounts
Confirmed compromise
AD + Entra ID
Reset compromised passwords
Confirmed compromise
AD + Entra ID
Revoke active sessions
All suspicious accounts
Entra ID
Disable service accounts
If used in attack
AD (with caution)
Block suspicious IPs
Attacker infrastructure
Conditional Access
Account Containment Commands
Step 2.4: Preserve Evidence
⚠️ Critical: Do not wipe or reimage systems until evidence is preserved!
Memory dumps
MDE Live Response, WinPmem
High
Ransomware samples
MDE quarantine, manual collection
High
Ransom notes
Copy to evidence storage
High
Event logs
Export before rotation
High
MFT/filesystem metadata
Forensic tools
Medium
Network captures
PCAP from network devices
Medium
Step 2.5: Protect Backups
Verify backup isolation
Ensure backups not accessible to attackers
Disable backup network access
Prevent backup encryption/deletion
Validate backup integrity
Confirm backups are usable
Create backup of backups
Protect recovery capability
Document backup status
Record what's available for recovery
Containment Checklist
Phase 3: Investigation
Timeline: Ongoing (parallel to containment/eradication) Objective: Determine full scope, identify root cause, and map impact.
Step 3.1: Identify Patient Zero
Query for earliest ransomware indicators
Trace back from encrypted systems
Identify initial access vector
Document initial compromise timeline
Determine attacker dwell time
Step 3.2: Map Lateral Movement
Query all lateral movement for compromised accounts
Identify all systems accessed
Map credential usage patterns
Document administrative access points
Identify Domain Controller access
Step 3.3: Determine Full Scope
How many systems encrypted?
MDE query, file share scan
Which systems were accessed?
Logon event analysis
What accounts compromised?
Authentication analysis
Was data exfiltrated?
Network analysis, cloud logs
Are backups affected?
Backup system verification
Are DCs compromised?
DC forensic analysis
Step 3.4: Assess Data Exfiltration
Review network traffic for large outbound transfers
Check cloud storage activity
Review known exfiltration tools
Analyse pre-encryption timeline
Document potential data exposure
Step 3.5: Identify Ransomware Variant
Collect ransom notes
Analyse encrypted file extensions
Check ransomware identification services
Research variant-specific TTPs
Check for available decryptors
Investigation Documentation Template
Phase 4: Eradication
Timeline: After containment confirmed
Objective: Remove all attacker presence from the environment.
⚠️ Warning: Do not begin eradication until containment is complete. Partial eradication may alert attackers and trigger destructive actions.
Step 4.1: Credential Reset Strategy
Tiered Credential Reset
Tier 0
KRBTGT, Domain Admin, Enterprise Admin
Immediately if DC compromised
Scripted reset
Tier 1
All privileged accounts
After Tier 0
Scripted reset
Tier 2
Service accounts
After Tier 1
Coordinated reset
Tier 3
All user accounts
After Tier 1-2
Forced reset at logon
KRBTGT Reset Procedure
⚠️ Critical: KRBTGT reset affects all Kerberos authentication. Plan carefully.
Domain Admin Reset
Step 4.2: Malware Removal
Per-System Eradication
1
Run full AV scan
MDE full scan
2
Remove persistence mechanisms
Registry, services, tasks
3
Remove malware files
All identified binaries
4
Remove attacker tools
Cobalt Strike, Mimikatz, etc.
5
Verify removal
Second scan, manual check
Persistence Mechanism Removal
Step 4.3: GPO Cleanup
Step 4.4: Validate Eradication
Full endpoint scan
MDE scan all systems
No detections
Persistence check
Manual/script verification
No persistence found
Network monitoring
24-48 hour monitoring
No C2 callbacks
Credential verification
Test authentication
Clean authentication
IOC search
Hunt for known IOCs
No matches
Eradication Checklist
Phase 5: Recovery
Timeline: After eradication validated
Objective: Restore systems and data from clean backups.
Step 5.1: Recovery Prioritisation
P1
Domain Controllers
Rebuild or verified backup
Immediate
P2
Authentication infrastructure
Rebuild or verified backup
Immediate
P3
Critical business applications
Backup restore
24-48 hours
P4
File servers
Backup restore
48-72 hours
P5
User workstations
Reimage + backup data
As capacity allows
Step 5.2: Backup Validation
⚠️ Critical: Validate backups are clean before restoration!
Isolate backup
Air-gapped restoration
Prevent infection
Scan backup
AV/EDR scan
Detect malware
Test restore
Restore to isolated VM
Verify integrity
Date verification
Confirm backup date
Ensure pre-infection
Application test
Test functionality
Verify usability
Step 5.3: Domain Controller Recovery
If DCs Are Compromised
Restore from backup
Clean backup available, <24hrs old
Medium
Rebuild DC
No clean backup, or backup old
High
Forest recovery
Multiple/all DCs compromised
Very High
DC Rebuild Procedure (Summary)
Build new DC on clean hardware/VM
Promote to Domain Controller
Wait for replication
Seize FSMO roles if needed
Demote compromised DCs
Remove compromised DC metadata
Validate AD functionality
Step 5.4: System Recovery Procedures
Server Recovery
Workstation Recovery
Step 5.5: Data Recovery
File shares
Restore from backup
Spot check + AV scan
Databases
Restore from backup
Integrity check + test
PST restore or O365 recovery
Verify mailbox function
Cloud data
Point-in-time recovery
Verify access
Application data
Application-specific restore
Application testing
Recovery Checklist
Phase 6: Post-Incident Activities
Timeline: After recovery complete
Objective: Learn from the incident and improve defences.
Step 6.1: Post-Incident Review (PIR)
Detection
How was the incident detected? How long was dwell time?
Response
What worked well? What could be improved?
Containment
Was containment fast enough? What slowed it down?
Eradication
Was eradication complete? Any reinfection?
Recovery
How long did recovery take? Were backups adequate?
Communication
Was communication effective? Any gaps?
Step 6.2: Documentation Requirements
Technical Report
Full technical details, IOCs, timeline
Security team
Executive Summary
Business impact, costs, key decisions
Leadership
Legal Report
Evidence, timeline for litigation
Legal counsel
Regulatory Report
Data breach details if applicable
Regulators
Insurance Claim
Costs, timeline, evidence
Cyber insurance
Step 6.3: Hardening Recommendations
Identity
MFA everywhere, privileged access management, reduced admin accounts
Endpoint
EDR coverage, application control, attack surface reduction
Network
Segmentation, east-west traffic monitoring, zero trust
Backup
Air-gapped backups, immutable storage, tested restoration
Detection
Improved alerting, UEBA, deception technology
Response
Updated runbooks, tabletop exercises, IR retainer
Step 6.4: Regulatory Notifications
GDPR
Data Protection Authority if EU data
72 hours
HIPAA
HHS if PHI involved
60 days
State Breach Laws
State AG, affected individuals
Varies (typically 30-60 days)
SEC
Material cybersecurity incidents
4 business days
PCI-DSS
Card brands, acquirer
Immediately
CISA
Critical infrastructure
72 hours
KQL Query Cheat Sheet
Ransomware Detection Queries
Mass File Modification Detection
Known Ransomware Extensions
Ransom Note Detection
Shadow Copy Deletion
Security Tool Tampering
Pre-Encryption Activity Detection
Credential Dumping Tools
Reconnaissance Tools
PsExec and Remote Execution
Lateral Movement Velocity
Active Encryption Detection
Real-Time File Encryption Alert
Encryption Process Identification
Affected Systems Dashboard
Post-Compromise Investigation
Timeline for Affected Device
Account Activity Analysis
C2 Communication Detection
Backup and Recovery Queries
Backup System Access
VSS Activity Monitoring
Response Actions & Commands
Immediate Response Actions
MDE Device Isolation
Network Containment via Prisma Access
Mass Account Disable
Evidence Collection
Collect Ransomware Artifacts
Memory Acquisition
Quick Reference Cards
Ransomware Response Checklist
Immediate Actions (First 15 Minutes)
Containment Actions (15-60 Minutes)
Investigation Actions (Ongoing)
Eradication Actions (After Containment)
Recovery Actions (After Eradication)
Ransomware Variant Quick Reference
.lockbit3 extension, red wallpaper
LockBit 3.0
Fast encryption, RaaS
.ALPHV extension, rust-based
BlackCat/ALPHV
Cross-platform
Targets MOVEit/GoAnywhere
Cl0p
Zero-day exploitation
.royal extension
Royal/BlackSuit
Partial encryption
.play extension
Play
No RaaS, stealth
.akira extension, retro theme
Akira
VPN targeting
.basta extension
Black Basta
QakBot delivery
Critical Contacts Template
IR Team Lead
CISO
Legal Counsel
External IR Firm
Cyber Insurance
FBI Field Office
PR/Communications
Escalation Matrix
Severity Classification
🔴 Critical
Active encryption spreading, DCs affected, >50 systems
All hands, external IR
🟠 High
Encryption contained, multiple servers affected
Full IR team
🟡 Medium
Single server or multiple workstations
Tier 2 + Tier 1
🟢 Low
Single workstation, rapidly contained
Tier 1 with Tier 2 backup
Escalation Timeline
0-15 min
IR team lead notified, incident declared
15-30 min
CISO notified, containment in progress
30-60 min
Executive leadership briefed
1-4 hours
External IR engaged (if needed), Legal notified
4-24 hours
Board notification (if critical), insurance notified
24-72 hours
Regulatory notification assessment
Communication Templates
Initial Executive Notification
Status Update Template
MITRE ATT&CK Mapping
Pre-Ransomware Techniques
Initial Access
Phishing
T1566
MDO alerts
Initial Access
External Remote Services
T1133
VPN/RDP logs
Initial Access
Valid Accounts
T1078
SigninLogs anomalies
Execution
PowerShell
T1059.001
Script block logging
Execution
Command Interpreter
T1059.003
Process command lines
Persistence
Scheduled Task
T1053.005
Event 4698
Persistence
Registry Run Keys
T1547.001
Registry monitoring
Privilege Escalation
Valid Accounts
T1078
Privileged logons
Defense Evasion
Disable Security Tools
T1562.001
MDE health alerts
Credential Access
OS Credential Dumping
T1003
MDE alerts, process events
Credential Access
Kerberoasting
T1558.003
Event 4769
Discovery
Domain Trust Discovery
T1482
Nltest, AD queries
Discovery
Network Share Discovery
T1135
Net view commands
Lateral Movement
Remote Services
T1021
Logon events
Lateral Movement
SMB/Admin Shares
T1021.002
Event 5140
Collection
Data from Local System
T1005
File access
Exfiltration
Exfil Over Web Service
T1567
Network traffic
Ransomware Execution Techniques
Impact
Data Encrypted for Impact
T1486
Mass file modification
Impact
Inhibit System Recovery
T1490
VSS deletion, bcdedit
Impact
Service Stop
T1489
Service control events
Impact
System Shutdown/Reboot
T1529
System events
Appendix: Additional Resources
Ransomware Identification Resources
ID Ransomware
https://id-ransomware.malwarehunterteam.com
Identify variant by sample
No More Ransom
https://www.nomoreransom.org
Free decryptors
Ransomwhere
https://ransomwhe.re
Ransom payment tracking
CISA Ransomware Guide
https://www.cisa.gov/stopransomware
Official guidance
Decryptor Resources
No More Ransom Project
https://www.nomoreransom.org/en/decryption-tools.html
Emsisoft Decryptors
https://www.emsisoft.com/ransomware-decryption-tools/
Kaspersky No Ransom
https://noransom.kaspersky.com
Avast Decryptors
https://www.avast.com/ransomware-decryption-tools
Legal and Regulatory Resources
FBI IC3
https://www.ic3.gov (report ransomware)
CISA
https://www.cisa.gov/stopransomware
OFAC Sanctions
Check before any ransom consideration
State Breach Laws
Varies by state
Ransom Payment Considerations
⚠️ Important Legal Note: This section is for awareness only. Ransom payment decisions require legal, executive, and potentially law enforcement consultation.
OFAC Sanctions
Payment to sanctioned entities is illegal
No Guarantee
Payment doesn't guarantee decryption
Repeat Targeting
Paying may invite future attacks
Data Already Leaked
Payment won't prevent data publication
Decryptor Availability
Free decryptors may exist
Backup Recovery
Recovery without payment may be possible
Insurance Coverage
Policy may have payment restrictions
Legal Liability
Consider all legal implications
Recommendation: Exhaust all recovery options before considering payment. Always involve legal counsel and potentially law enforcement.
🚨 CRITICAL REMINDER: Ransomware incidents are time-critical. Every minute of delay can result in additional encrypted systems. However, hasty actions can destroy evidence or alert attackers. Balance speed with precision. When in doubt, isolate first, investigate second. NEVER pay ransom without exhausting all other options and consulting legal counsel. Most importantly—test your backups regularly; they are your primary recovery mechanism.
Last updated