Checklist
Comprehensive Incident Response Procedures Using Key Tools
This guide outlines a systematic approach to incident response using tools like Process Hacker, Autoruns, and more, focusing on memory analysis, user account changes, scheduled tasks, services, and startup mechanisms.
1. Memory Analysis
Tools:
Process Hacker
Key Procedures:
A. Process Tree
Inspect the parent-child relationships.
Identify suspicious child processes like
cmd.exe
orpowershell.exe
under unusual parents (winword.exe
,explorer.exe
).
Steps:
Open Process Hacker.
Navigate to the Processes tab.
Analyze processes for anomalies.
B. Web Connections
Identify malicious connections, unusual remote IPs, or non-standard ports.
Steps:
In Process Hacker, open the Network tab.
Investigate processes with external connections.
C. Signature Status
Check if processes are digitally signed.
Steps:
Right-click on the column header in Process Hacker.
Add the Verification Status and Verified Signer columns.
Investigate unsigned or suspiciously signed processes.
2. User Analysis
Tools:
Net User
Lusrmgr.msc
Event Viewer
Key Events to Investigate:
A. Account Creation
Event ID 4720: A new user account was created.
Steps:
Use Event Viewer:
Navigate to Windows Logs -> Security.
Filter by Event ID 4720.
Use Net User:
Run
net user
to list user accounts.
B. Group Membership Changes
Event ID 4732: A user was added to a security-enabled local group.
Steps:
Open Event Viewer.
Filter by Event ID 4732 to detect any unauthorized privilege escalations.
3. Scheduled Tasks
Tools:
Autoruns
Event Viewer
Key Events to Investigate:
Event ID 4698: A scheduled task was created.
Event ID 4702: A scheduled task was updated.
Steps:
Use Autoruns:
Navigate to the Scheduled Tasks tab.
Look for suspicious tasks without publishers.
Use Event Viewer:
Open Applications and Services Logs -> Microsoft -> Windows -> TaskScheduler -> Operational.evtx.
Filter for Event ID 4698 or 4702.
4. Services
Tools:
Autoruns
Event Viewer
Key Steps:
Use Autoruns:
Navigate to the Services tab.
Review services for unsigned or suspicious entries.
Analyze logs:
Use Event Viewer to find logs related to service creation or modification.
5. Registry Run Keys / Startup Folder
Tools:
Autoruns
Event Viewer
Key Registry Locations:
HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE paths for
Run
andRunOnce
.Policies\Explorer\Run for policy-based startup programs.
Key Event:
Event ID 4657: A registry value was modified.
Steps:
Use Autoruns:
Check the Logon tab for suspicious entries.
Use Event Viewer:
Navigate to Windows Logs -> Security.
Filter by Event ID 4657.
Key Takeaways
By leveraging these tools and procedures:
Memory Analysis identifies active threats.
User and Scheduled Task Analysis detects unauthorized account and task creation.
Service and Registry Analysis uncovers persistence mechanisms.
Consistent log analysis and tool usage ensure a comprehensive incident response process.
Last updated