Note: This section is intended to be an incident response guide. Some tasks may not be relevant, required or appropriate. Please consider your environment before implementing each step or other steps as needed.
Malicious effects on systems list. Acquire an itemized list of all known changes on computer systems, files, settings, registry, services add/modified/deleted or stop/started.
Priority: H/M/L | Effort: H/M/L | Open/Closed
Which A/V or malware tools can detect and remove malicious threat?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Where does malware/attacker exit the network?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Malicious internal/external sites/connections still active?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Malware listening on any ports?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Malware method of original infection, and/or weakness?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Packet capture of Malware trying to infect others?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Any packet capture of malware trying to communicate out of network and ID method of ports, IPs, DNS, etc?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Malware pose threat to any sensitive data (Files, credentials, Intellectual Property, PII, etc)?
Priority: H/M/L | Effort: H/M/L | Open/Closed
What are the DNS entries on an infected system?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Is it possible to detect the first infected system(s)?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Has the first systems hard drive been preserved?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Do any scripts need to be ran on live infected systems?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Is there a desktop management tool? If so, what reports are available to inventory all systems and statuses?
Priority: H/M/L | Effort: H/M/L | Open/Closed
List of all infected systems?
Priority: H/M/L | Effort: H/M/L | Open/Closed
Identify any patching missing with current and/or previous vulnerability scan.
Priority: H/M/L | Effort: H/M/L | Open/Closed
Look for systems that have stopped reporting into Malware servers for updates, or which ones have stopped going to AV vendors for updates.
Priority: H/M/L | Effort: H/M/L | Open/Closed
Look for systems that have stopped going to Update server or directly to Microsoft for updates.
Leverages pivot system(s) and network path(s) to exit the victim network including VPN/Dial-Up, HTTP/HTTPS, and other standard or non-standard services and ports.
Yes | No | Unknown | N/A
Ability to leverage mobile devices and other removable media.
Yes | No | Unknown | N/A
Ability to detect and utilize authenticated web proxies.
Yes | No | Unknown | N/A
Morphs on victim client system.
Yes | No | Unknown | N/A
Contains red herring (misleading/distracting) features depending on the environment it detects.