Script file added to startup-related Registry keys
#
This Playbook is part of the Cortex Response And Remediation Pack.Supported versions
Supported Cortex XSOAR versions: 8.9.0 and later.
This playbook handles "Script file added to startup-related Registry keys" alerts.
Playbook Stages:
Analysis:
- Extract the script path from the registry key value.
- Check the reputation of the associated processes.
Investigation:
- Searches for related Cortex XSIAM alerts to identify potential attack patterns.
- Retrieves the script file and relevant details for investigation.
- Analyzes the script for malicious or suspicious parameters:
- If malicious parameters are found, proceed to remediation.
- If suspicious parameters are found, detonate and analyze the script using WildFire Sandbox.
- Checks the script file reputation.
- Detonates and analyzes the script using WildFire Sandbox.
Remediation:
- Terminates the malicious process.
- Quarantines the malicious process.
- Adds the malicious process hash to the blocklist.
- Calculates the script file’s SHA256 hash if not already available.
- Deletes the Registry key value (Requires analyst approval).
- Adds the script file hash to the blocklist (Requires analyst approval).
- Automatically close the alert.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Quarantine File
- Wildfire Sandbox - Detonate and Analyze File
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- CommandLineAnalysis
- MatchRegexV2
- ReadFile
- SearchAlertsV2
- Set
- SetAndHandleEmpty
- SetMultipleValues
- UnzipFile
#
Commands- closeInvestigation
- core-blocklist-files
- core-get-cloud-original-alerts
- core-get-script-execution-results
- core-retrieve-file-details
- core-retrieve-files
- core-run-script-execute-commands
- core-terminate-causality
- extractIndicators
- file
- wildfire-get-verdict
#
Playbook InputsThere are no inputs for this playbook.
#
Playbook OutputsThere are no outputs for this playbook.