OVERVIEW
GENERAL
General Details
Reputation Details
ENTRY POINT
Summary
Complete
REMEDIATION
BUSINESS IMPACT
SUSPICIOUS ACTIVITY
Mitre ATT&CK™ Matrix
Suspicious Events
Network Events
INCIDENT DETAILS
Tree
Tree Timeline
ACTIVE
status
Ryuk
malware family
HIGH
severity
Endpoint Behavioral Guard
triggered by
c:\windows\system32\dllhost.exe
trigger
ransomware.win.honey
protection name
dave
remote user
ATTACK STATS
What sort of connections and processes were involved?
Remote Logon
Internal
Malicious
Connections
Suspicious
Connections
Unclassified
Connections
1
Malicious
Processes
Suspicious
Processes
Unclassified
Processes
Malicious
Files
Suspicious
Files
Unsigned
Processes
Script
Processes
ATTACK TYPES
What were the attacks types seen or prevented?
bot
infostealer
ransomware
trojan
ENTRY POINT
How did it enter the system?
dave was remotely logged in via RDP. Incident started with network access in chrome.exe
BUSINESS IMPACT
What was the potential damage done?
6
Credential
Theft
35
Data
Changes
1929
Data
Loss
1
Privacy
Violation
REMEDIATION
Were all incident created elements removed?
No remediation needed
98%
675/685
terminated processes
0%
0/6
quarantined/deleted files
restored files
INCIDENT DETAILS (685 processes)
How do I analyze further?
sihost.exe
runtimebroker.exe
cmd.exe
cpefrcli.exe
cmd.exe
vssadmin.exe
conhost.exe
shellexperiencehost.exe
dllhost.exe
taskhostw.exe
svchost.exe
conhost.exe
dllhost.exe
p-r-0-c-3-x-p64.exe
skypehost.exe
searchui.exe
smartscreen.exe
cmd.exe
conhost.exe
rdpclip.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
ryuk.exe
taskkill.exe
conhost.exe
net.exe
conhost.exe
net.exe
net1.exe
cmd.exe
reg.exe
conhost.exe
MITRE ATT&CK™
Tactics and techniques seen as defined by the MITRE ATT&CK™ framework
Initial Access
Remote Logon
Valid Accounts
Execution
Command-Line Interface
Execution through API
Scripting
Unsigned Process
User Execution
Persistence
Registry Run Keys / Startup Folder
Valid Accounts
Privilege Escalation
Process Injection
Valid Accounts
Defense Evasion
Modify Registry
Process Injection
Scripting
Valid Accounts
Credential Access
Discovery
Browser Bookmark Discovery
Lateral Movement
Collection
Data from Local System
Data from Network Shared Drive
Man in the Browser
Command and Control
Commonly Used Port
Exfiltration
Impact
Data Encrypted for Impact
Inhibit System Recovery
Process Termination
Service Stop
NETWORK MAP
Where were the untrusted connections being made?
Country
Europe (1 suspicious)
Netherlands (1 unknown)
United States (1 unknown)
INCIDENT DETAILS (685 processes)
How do I analyze further?
sihost.exe
runtimebroker.exe
cmd.exe
cpefrcli.exe
cmd.exe
vssadmin.exe
conhost.exe
shellexperiencehost.exe
dllhost.exe
taskhostw.exe
svchost.exe
conhost.exe
dllhost.exe
p-r-0-c-3-x-p64.exe
skypehost.exe
searchui.exe
smartscreen.exe
cmd.exe
conhost.exe
rdpclip.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
ryuk.exe
taskkill.exe
conhost.exe
net.exe
conhost.exe
net.exe
net1.exe
cmd.exe
reg.exe
conhost.exe
MITRE ATT&CK™
Tactics and techniques seen as defined by the MITRE ATT&CK™ framework
Initial Access
Remote Logon
Valid Accounts
Execution
Command-Line Interface
Execution through API
Scripting
Unsigned Process
User Execution
Persistence
Registry Run Keys / Startup Folder
Valid Accounts
Privilege Escalation
Process Injection
Valid Accounts
Defense Evasion
Modify Registry
Process Injection
Scripting
Valid Accounts
Credential Access
Discovery
Browser Bookmark Discovery
Lateral Movement
Collection
Data from Local System
Data from Network Shared Drive
Man in the Browser
Command and Control
Commonly Used Port
Exfiltration
Impact
Data Encrypted for Impact
Inhibit System Recovery
Process Termination
Service Stop
NETWORK MAP
Where were the untrusted connections being made?
Country
Europe (1 suspicious)
Netherlands (1 unknown)
United States (1 unknown)
INCIDENT DETAILS (685 processes)
How do I analyze further?
sihost.exe
runtimebroker.exe
cmd.exe
cpefrcli.exe
cmd.exe
vssadmin.exe
conhost.exe
shellexperiencehost.exe
dllhost.exe
taskhostw.exe
svchost.exe
conhost.exe
dllhost.exe
p-r-0-c-3-x-p64.exe
skypehost.exe
searchui.exe
smartscreen.exe
cmd.exe
conhost.exe
rdpclip.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
chrome.exe
ryuk.exe
taskkill.exe
conhost.exe
net.exe
conhost.exe
net.exe
net1.exe
cmd.exe
reg.exe
conhost.exe