Uncommon creation or access operation of sensitive shadow copy by a high-risk process
#
This Playbook is part of the Core - Investigation and Response Pack.Supported versions
Supported Cortex XSOAR versions: 8.8.0 and later.
This playbook addresses the following alerts:
- Uncommon creation or access operation of sensitive shadow copy by a high-risk process
Playbook Stages:
Triage:
- Check if the causality process image (CGO) is signed or not
Investigation:
- If CGO is unsigned:
- Check the CGO process prevalence
- Check if the process image path is common
- If CGO is signed:
- Check process image name
- Check initiating process image name
- Check if username is SYSTEM
- Check if host is a server
- Check for previous similar alert closed as False Positive
Containment:
- Terminate causality process (CGO) process - when a signed high-risk process or an unsigned process from an uncommon path attempting to create or access sensitive shadow copy data.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- CortexCoreIR
#
Scripts- SearchIncidentsV2
#
Commands- closeInvestigation
- core-get-process-analytics-prevalence
- core-terminate-causality
#
Playbook InputsThere are no inputs for this playbook.
#
Playbook OutputsThere are no outputs for this playbook.