Impact (TA0040)
Sub-technique: T1486 - Data Encrypted for Impact
Objective: Detect encryption of data to cause harm, such as ransomware attacks.
Detect Encryption Tools in Use
DeviceProcessEvents
| where ProcessCommandLine has_any ("encrypt", "ransom")
| project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessFileName, InitiatingProcessParentFileName
| order by Timestamp descPurpose: Identify the use of encryption tools associated with ransomware.
Monitor for Mass File Renaming
DeviceFileEvents
| where ActionType == "FileRenamed"
| summarize eventCount = count() by FileName, DeviceName, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessFileName
| where eventCount > 100
| project FileName, DeviceName, eventCount, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessFileName
| order by eventCount descPurpose: Detect mass renaming of files that may indicate encryption.
Detect Ransomware Note Files
DeviceFileEvents
| where FileName in ("ransomnote.txt", "readme.txt")
| project Timestamp, DeviceName, FileName, FolderPath, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessFileName
| order by Timestamp descPurpose: Identify the creation of ransomware note files.
Monitor for Unusual File Extensions
Purpose: Detect unusual file extensions that might indicate encryption.
Detect File Deletion After Encryption
Purpose: Identify deletion of backup or temporary files after encryption.
Monitor for Encryption via PowerShell
Purpose: Detect encryption commands executed via PowerShell.
Detect Use of Known Ransomware Executables
Purpose: Identify known ransomware executables.
Monitor for Suspicious Network Encryption Tools
Purpose: Detect network encryption tools that may be used maliciously.
Detect Unusual Volume of File Modifications
Purpose: Identify a large number of file modifications, which may indicate encryption.
Monitor for Attempts to Disable Antivirus
Purpose: Detect attempts to disable antivirus protections before encryption.
Last updated