Windows Malware Detection Playbook
Table of Contents
1. Initial Malware Detection
Query Option 1: Detect Unusual Process Executions
Query Option 2: Detect Processes Launched from Temporary Directories
Query Option 3: Advanced Suspicious Command Detection
2. Persistence Mechanisms
Query Option 1: Registry Key Modifications
Query Option 2: Scheduled Tasks Creation
Query Option 3: Advanced Startup Folder Monitoring
3. Privilege Escalation and Credential Theft
Query Option 1: Suspicious LSASS Access
Query Option 2: Mimikatz-Style Activities
Query Option 3: Advanced Credential Dumping Detection
4. Lateral Movement Detection
Query Option 1: Remote Execution Using PsExec
Query Option 2: Network Shares Access
Query Option 3: Lateral Movement via WMI
5. Data Exfiltration Indicators
Query Option 1: Large Data Transfers to External Destinations
Query Option 2: Use of File Compression Tools
Query Option 3: DNS Tunneling Detection
6. Post-Incident Investigation
Query Option 1: Correlation of File Hashes
Query Option 2: Compromised User Accounts
Query Option 3: Incident Timeline Reconstruction
Conclusion
Last updated