Ransomware Investigation & Response Runbook
SOC & DFIR Operations Guide
Overview & Scope
What is Ransomware?
Environment Architecture
Component
Role in Ransomware Response
Ransomware Attack Lifecycle
Ransomware Families Reference
Prevalent Ransomware Groups (2024-2025)
Group/Ransomware
Characteristics
TTPs
Ransomware File Extensions
Extension
Ransomware Family
Detection Sources & Indicators
Log Sources Matrix
Platform
Log Table
Ransomware Detection Data
Pre-Encryption Indicators (Warning Signs)
Days/Weeks Before Encryption
Indicator
Description
Detection Source
Hours Before Encryption
Indicator
Description
Detection Source
Active Encryption Indicators
Indicator
Description
Detection Source
Critical Detection Rules
MDE Alert Categories for Ransomware
Alert Category
Severity
Action
Investigation Workflows
Ransomware Incident Response Phases
Phase 1: Detection & Initial Response
Step 1.1: Alert Validation
Step 1.2: Initial Scope Assessment
Step 1.3: Incident Declaration
Condition
Declaration
Step 1.4: Activate Incident Response
Initial Response Checklist
Phase 2: Containment
Step 2.1: Network Containment
Priority
Action
Method
Risk
Step 2.2: Endpoint Containment
Step 2.3: Identity Containment
Action
When
Method
Step 2.4: Preserve Evidence
Evidence Type
Collection Method
Priority
Step 2.5: Protect Backups
Action
Purpose
Containment Checklist
Phase 3: Investigation
Step 3.1: Identify Patient Zero
Step 3.2: Map Lateral Movement
Step 3.3: Determine Full Scope
Question
Investigation Method
Step 3.4: Assess Data Exfiltration
Step 3.5: Identify Ransomware Variant
Investigation Documentation Template
Phase 4: Eradication
Step 4.1: Credential Reset Strategy
Tier
Accounts
When
Method
Step 4.2: Malware Removal
Step
Action
Verification
Step 4.3: GPO Cleanup
Step 4.4: Validate Eradication
Validation Check
Method
Pass Criteria
Eradication Checklist
Phase 5: Recovery
Step 5.1: Recovery Prioritisation
Priority
Systems
Recovery Method
Timeline Target
Step 5.2: Backup Validation
Validation Step
Method
Purpose
Step 5.3: Domain Controller Recovery
Option
When to Use
Complexity
Step 5.4: System Recovery Procedures
Step 5.5: Data Recovery
Data Type
Recovery Method
Validation
Recovery Checklist
Phase 6: Post-Incident Activities
Step 6.1: Post-Incident Review (PIR)
Topic
Questions to Address
Step 6.2: Documentation Requirements
Document
Contents
Audience
Step 6.3: Hardening Recommendations
Category
Common Improvements
Step 6.4: Regulatory Notifications
Regulation
Notification Requirement
Timeline
KQL Query Cheat Sheet
Ransomware Detection Queries
Mass File Modification Detection
Known Ransomware Extensions
Ransom Note Detection
Shadow Copy Deletion
Security Tool Tampering
Pre-Encryption Activity Detection
Credential Dumping Tools
Reconnaissance Tools
PsExec and Remote Execution
Lateral Movement Velocity
Active Encryption Detection
Real-Time File Encryption Alert
Encryption Process Identification
Affected Systems Dashboard
Post-Compromise Investigation
Timeline for Affected Device
Account Activity Analysis
C2 Communication Detection
Backup and Recovery Queries
Backup System Access
VSS Activity Monitoring
Response Actions & Commands
Immediate Response Actions
MDE Device Isolation
Network Containment via Prisma Access
Mass Account Disable
Evidence Collection
Collect Ransomware Artifacts
Memory Acquisition
Quick Reference Cards
Ransomware Response Checklist
Immediate Actions (First 15 Minutes)
Containment Actions (15-60 Minutes)
Investigation Actions (Ongoing)
Eradication Actions (After Containment)
Recovery Actions (After Eradication)
Ransomware Variant Quick Reference
If You See...
Likely Ransomware
Known For
Critical Contacts Template
Role
Name
Phone
Email
Escalation Matrix
Severity Classification
Severity
Criteria
Response
Escalation Timeline
Time
Actions
Communication Templates
Initial Executive Notification
Status Update Template
MITRE ATT&CK Mapping
Pre-Ransomware Techniques
Tactic
Technique
ID
Detection
Ransomware Execution Techniques
Tactic
Technique
ID
Detection
Appendix: Additional Resources
Ransomware Identification Resources
Resource
URL
Purpose
Decryptor Resources
Source
URL
Legal and Regulatory Resources
Topic
Resource
Ransom Payment Considerations
Factor
Consideration
Last updated