Identification Of New Leads & Impacted Systems


1. Analyzing IOC Hits

Purpose: To identify new leads and impacted systems by analyzing hits from IOC searches.

  • Why: IOC hits can reveal additional compromised systems or related malicious activity, helping to expand the scope of the investigation.

  • Technical Example:

    • Search for IOCs Across Systems:

      • Use SIEM tools to search for IOCs across logs and endpoints:

        index=security_logs file_hash="abc123" OR src_ip="192.168.1.100"
      • Query EDR tools for suspicious activity:

        Get-MDATPDeviceAlerts -Severity High | Select-Object DeviceName, AlertTitle
    • Cross-Reference with Asset Inventory:

      • Identify systems associated with IOC hits:

        SELECT hostname, ip_address FROM assets WHERE ip_address IN ('192.168.1.100', '192.168.1.101');

2. Eliminating False Positives

Purpose: To filter out irrelevant or overly generic IOC matches that do not relate to the incident.

  • Why: False positives can waste time and resources, diverting focus from genuine threats.

  • Technical Example:

    • Validate IOC Hits:

      • Investigate whether the hit is relevant to the incident:

      • Compare with known legitimate activity (e.g., software updates):

    • Refine Generic IOCs:

      • Narrow down overly broad IOCs to reduce false positives:


3. Prioritizing Leads

Purpose: To focus on high-value leads that are most likely to provide actionable insights.

  • Why: When dealing with a large number of IOC hits, prioritization ensures efficient use of resources and faster progress in the investigation.

  • Technical Example:

    • Prioritize Based on Severity:

      • Focus on systems with critical alerts or high-severity events:

    • Focus on Business-Critical Systems:

      • Identify and prioritize systems that are critical to operations:

    • Prioritize Leads with Forensic Value:

      • Select systems where forensic analysis is likely to yield new insights:


4. Identifying New Leads

Purpose: To uncover additional systems, activities, or artifacts that expand the understanding of the incident.

  • Why: New leads often reveal lateral movement, persistence mechanisms, or other attack vectors that were previously unknown.

  • Technical Example:

    • Trace Lateral Movement:

      • Analyze logs for unusual login attempts or connections between systems:

      • Use tools like BloodHound to map relationships between users and systems:

    • Identify Persistence Mechanisms:

      • Search for registry keys or scheduled tasks created by attackers:


5. Handling Large Numbers of Hits

Purpose: To manage and process a high volume of IOC hits effectively.

  • Why: Large numbers of hits can overwhelm investigators, so systematic filtering and prioritization are essential.

  • Technical Example:

    • Automate IOC Filtering:

      • Use scripts to filter and categorize IOC hits:

    • Visualize Hit Data:

      • Use visualization tools to identify patterns and trends:


Conclusion

The identification of new leads and impacted systems is a critical step in expanding the scope of an investigation. By analyzing IOC hits, eliminating false positives, and prioritizing high-value leads, organizations can efficiently uncover additional compromised systems and malicious activities.

Last updated