Post Intrusion Ransomware Investigation
Ransomware Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
Provides the first step in the investigation of ransomware attacks. The playbook requires the ransom note and an example of an encrypted file (<1MB) to try to identify the ransomware and find a recovery tool via the online database. You will be guided with further investigation steps throughout the playbook, some of the key features are:
- Encrypted file owner investigation
- Endpoint forensic investigation
- Active Directory investigation
- Timeline of the breach investigation
- Indicator and account enrichment
Playbook settings and mapping: For the full operation of the playbook, the following data should be mapped to the relevant incident fields. Username - Usernames (common incident field) Hostname - Hostnames (common incident field)
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Endpoint Enrichment - Generic v2.1
- Active Directory Investigation
- Extract Indicators From File - Generic v2
- Detonate File - Generic
- Isolate Endpoint - Generic
- Account Enrichment - Generic v2.1
- File Enrichment - File reputation
- Block Indicators - Generic v3
#
Integrations- Active Directory Query v2
- Rasterize
#
Scripts- ReadFile
#
Commands- setIndicators
- send-mail
- relatedIncidents
- setIncident
- rasterize-email
- ad-disable-account
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
AutoRemediation | Determines whether to perform auto-isolation and remediation for the infected endpoint and indicators. Values: - True - False. This is the default. | False | Optional |
NotificationEmail | The email addresses to notify if there is a possibility of the malware spreading and infecting other endpoints. Can be a CSV list. | Optional | |
EmailBody | The malware notification message content. | During an endpoint investigation in XSOAR, other infected endpoints were found, indicating the malware is spreading in your organization and requires your attention. To get more information, go to this incident in XSOAR: ${incident.id}. | Optional |
UserVerification | Possible values: True/False. Whether to provide user verification for blocking IPs. False - No prompt will be displayed to the user. True - The server will ask the user for blocking verification and will display the blocking list. | False | Optional |
AutoBlockIndicators | Possible values: True/False. Default: True. Should the given indicators be automatically blocked, or should the user be given the option to choose? If set to False - no prompt will appear, and all provided indicators will be blocked automatically. If set to True - the user will be prompted to select which indicators to block. | True | Optional |
#
Playbook OutputsThere are no outputs for this playbook.