Malware Attack Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
Malware Categories
Category
Description
Common Examples
Common Attack Vectors
Vector
Description
Primary Detection
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
Key Data
Critical MDE Alert Categories
Alert Category
Description
Severity
Investigation Workflows
Malware Alert Triage
Step 1: Initial Alert Assessment
Step 2: Validate Detection
Step 3: Scope Assessment
Step 4: Risk Classification
Risk Level
Criteria
Action
Ransomware Investigation
Immediate Actions (First 15 Minutes)
Step 1: Identify Ransomware Variant
Step 2: Determine Patient Zero
Step 3: Map Lateral Movement
Step 4: Identify Data Exfiltration
Step 5: Containment & Eradication
Fileless Malware Investigation
Detection Indicators
Investigation Steps
Key LOLBins to Monitor
Binary
Malicious Use
Detection
Email-Based Malware Investigation
Step 1: Identify Malicious Email
Step 2: Recipient Analysis
Step 3: Email Artifact Analysis
Step 4: Remediation
KQL Query Cheat Sheet
Device Process Analysis
Suspicious Process Execution
Process Tree Analysis
Encoded PowerShell Detection
Malware Detection Queries
New/Rare Executables
Suspicious File Drops
Ransomware Behaviour Detection
Network & C2 Detection
Suspicious Outbound Connections
Beaconing Detection
DNS Anomaly Detection
Persistence Detection
Registry Persistence
Scheduled Task Creation
Service Installation
WMI Persistence
Email Malware Queries
Malicious Attachment Hunt
URL Click Analysis
Emails with Password-Protected Attachments
Threat Hunting Queries
Hunt for Cobalt Strike Indicators
Hunt for Mimikatz Activity
Living Off the Land Detection
Response Actions & Remediation
Immediate Containment Actions
Scenario
Action
Method
MDE Live Response Commands
Evidence Collection
Remediation Commands
Network Containment (Prisma Access)
Action
Location
Details
Post-Incident Remediation Checklist
Eradication
Recovery
Hardening
Quick Reference Cards
Malware Analysis Checklist
Step
Action
Tools
File Hash Quick Check
Common Malware File Locations
Location
Typical Use
Attack Stage Indicators
Stage
Indicators
Data Source
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Triggers
Condition
Escalation Level
Communication Templates
Initial Notification (Internal)
MITRE ATT&CK Mapping
Initial Access
Technique
ID
Detection
KQL Table
Execution
Technique
ID
Detection
KQL Table
Persistence
Technique
ID
Detection
KQL Table
Defense Evasion
Technique
ID
Detection
KQL Table
Credential Access
Technique
ID
Detection
KQL Table
Command & Control
Technique
ID
Detection
KQL Table
Exfiltration
Technique
ID
Detection
KQL Table
Appendix: Useful Commands
PowerShell Investigation
MDE Advanced Hunting in PowerShell
Network Analysis
Memory Analysis Prep
Evidence Collection Script
PreviousIdentity Attack Investigation RunbookNextUnauthorised Access & Privilege Escalation Investigation Runbook
Last updated