๐Ÿ”’ Ransomware Response Quickstart

Time-boxed response path for ransomware incidents covering initial triage through eradication. Prioritises containment to stop encryption spread, evidence preservation for decryption feasibility, and backup validation for recovery.

Kit
Overall Progress0/13 (0%)

First 15 Minutes

0/5
0/5 (0%)
1. Analyze Ransom Note & IndicatorsCritical~3m

Photograph or screenshot the ransom note and extract IOCs such as bitcoin wallet addresses, Tor URLs, threat-actor aliases, and embedded file extensions. Cross-reference the ransom note language and formatting against known ransomware family databases (e.g., ID Ransomware, No More Ransom) to identify the variant. Early identification of the ransomware family determines whether free decryptors exist and informs the overall containment strategy.

2. Identify Patient ZeroCritical~5m

Correlate the earliest encryption timestamps with authentication events, process execution logs, and email delivery records to pinpoint the first compromised host. Review Security Event Log entries for anomalous logon types (e.g., Event ID 4624 Type 10 for RDP) and Sysmon process-creation events around the identified timeframe. Establishing patient zero is essential for understanding the initial access vector and bounding the scope of compromise.

3. Isolate Affected Network SegmentsCritical~3m

Immediately segment affected VLANs, disable inter-site VPN tunnels to impacted locations, and block SMB (TCP 445) and RDP (TCP 3389) at internal firewall boundaries. The goal is to halt lateral propagation of encryption without taking down the entire network. Coordinate with network operations to implement ACLs or switch-port shutdowns for confirmed-infected subnets while preserving connectivity for forensic workstations.

4. Lock Compromised AccountsCritical~2m

Disable or reset credentials for all accounts observed in the attack chain, including service accounts and any domain admin accounts showing anomalous activity. Review Azure AD sign-in logs for impossible-travel or anomalous-IP authentications that may indicate additional compromised identities. Prioritize high-privilege accounts to prevent the attacker from deploying additional ransomware payloads or destroying backups.

5. Block Exfiltration ChannelsCritical~2m

Many modern ransomware operators exfiltrate data before encrypting. Block known exfiltration channels by denying outbound traffic to suspicious IPs, cloud-storage upload domains (e.g., mega.nz, anonfiles), and any C2 infrastructure identified from IOC analysis. Review firewall logs for large outbound data transfers in the hours preceding the encryption event to assess whether double-extortion is likely.

First 60 Minutes

0/4
0/4 (0%)
6. Capture Volatile MemoryCritical~10m

Acquire full physical memory dumps from patient zero and other key systems before they are rebooted or powered off. Memory captures may contain the encryption key in cleartext, unpacked ransomware binaries, injected code in running processes, and network connection artifacts that are lost on reboot. Use validated acquisition tools like WinPMEM or LiME and document hash values for chain-of-custody purposes.

7. Snapshot Critical LogsCritical~10m

Export and preserve copies of Windows Security and Sysmon event logs from all systems in scope before log rotation or attacker tampering can destroy them. Ransomware operators frequently clear event logs as part of their playbook, so time is critical. Copy EVTX files to a forensic share with write-protection and compute SHA-256 hashes for each file to maintain evidentiary integrity.

8. Collect EDR Telemetry~10m

Pull endpoint detection and response telemetry spanning at least 72 hours before the first encryption timestamp. Focus on process trees, file-write patterns, PowerShell/command-line activity, and network connections from affected endpoints. EDR data often reveals the full attack chain including initial access, privilege escalation, and lateral movement that preceded the ransomware deployment.

9. Map Encryption Scope~15m

Determine how many hosts, file shares, and data volumes have been encrypted by analyzing MFT records for file-extension changes, scanning network shares for ransom notes, and querying EDR for the ransomware binary hash across all endpoints. Build a heat-map of affected vs. unaffected systems to guide recovery prioritization. Knowing the full blast radius is essential for accurate executive communication and recovery planning.

First 4 Hours

0/4
0/4 (0%)
10. Trace Lateral Movement~30m

Reconstruct the attacker lateral-movement path by correlating logon events (Event IDs 4624, 4625, 4648), remote-service creation (Event ID 7045), scheduled-task creation, and PsExec/WMI execution artifacts across all in-scope hosts. Map the timeline of host-to-host movement to identify systems the attacker touched but may not have encrypted, as these could contain additional backdoors or staging tools.

11. Hunt Persistence Mechanisms~30m

Systematically sweep for persistence mechanisms the attacker may have planted beyond the ransomware itself, including scheduled tasks, Run/RunOnce registry keys, WMI event subscriptions, and new services. Examine Amcache and ShimCache to identify previously executed binaries that may indicate backdoors or RATs planted for re-entry. Failing to remove persistence will allow the attacker to re-encrypt after recovery.

12. Validate Backup IntegrityCritical~20m

Before beginning restoration, verify that backup copies have not been encrypted, deleted, or tampered with by the attacker. Test-restore a sample of critical data from offline, immutable, or air-gapped backups and validate file integrity. Check backup-system audit logs for unauthorized access or deletion attempts. Confirm the recovery-point objective (RPO) for each critical system and communicate realistic restoration timelines to leadership.

13. Remove Ransomware & Artifacts~30m

Eradicate all ransomware binaries, dropper scripts, and associated artifacts from affected systems. This includes removing ransomware executables, cleaning up scheduled tasks or services used for deployment, and deleting any staging directories. Use IOC sweeps with file hashes, file names, and YARA rules to ensure no remnants remain across the environment before beginning system restoration.