Skip to main content
Hard difficultyExfiltration & Impact45-60 minutes
SIEMXDRFirewall

Ransomware Activity Investigation

When indicators suggest ransomware, mass file encryption, suspicious process behavior, ransom notes, or shadow copy deletion, immediately isolate affected systems to prevent lateral spread. Investigate the attack timeline to determine initial access, scope of encryption, data exfiltration evidence, and which backups are intact. Ransomware investigations are time-critical; every minute of delay means more encrypted files.

Overview

Ransomware investigations are the highest-stakes alerts a SOC analyst faces. Modern ransomware groups operate as organized businesses with dedicated teams for initial access, lateral movement, data exfiltration, and encryption deployment. By the time encryption begins, the attacker has typically been in the environment for days or weeks.

This playbook covers the critical investigation steps from initial detection through containment, focusing on the time-sensitive actions that minimize damage. You will learn to identify pre-encryption indicators, assess backup integrity, detect data exfiltration, and coordinate the incident response.

When You See This

  1. 1

    XDR alert for mass file modifications with entropy changes consistent with encryption

  2. 2

    Volume Shadow Copy deletion (vssadmin delete shadows) or bcdedit /set changes

  3. 3

    Ransom note files (README.txt, DECRYPT.txt) appearing across network shares

  4. 4

    SIEM alert for suspicious PowerShell or batch scripts disabling security tools

  5. 5

    Multiple endpoints showing the same suspicious process executing simultaneously

Investigation Steps

  1. 1

    IMMEDIATELY isolate affected systems

    This is the one investigation type where containment comes BEFORE full analysis. Isolate affected systems from the network immediately; every minute of delay means more encrypted files and more lateral spread. Use XDR network isolation if available; otherwise coordinate with network team to block at the switch/VLAN level. Do NOT shut down affected systems as this destroys volatile forensic evidence.

    XDRFirewall
  2. 2

    Determine the ransomware variant

    Identify the ransomware family from ransom notes, encrypted file extensions, or process names. This determines whether a decryption tool exists, the typical attack chain, and the threat actor group. Check ransomware identification services with file samples or ransom note text.

    XDR
    index=endpoint (file_name="*.encrypted" OR file_name="README.txt" OR file_name="DECRYPT*") | stats count by dest_host, file_path | sort -count
    index=endpoint process_name!=("explorer.exe","svchost.exe","system") file_modifications>100 | stats count by dest_host, process_name, process_hash
  3. 3

    Map the blast radius

    Determine which systems are encrypted, which are still clean, and which are actively being encrypted. Check network shares, domain controllers, and backup servers specifically. The attacker almost always targets backups as a priority.

    SIEMXDR
    index=endpoint EventCode=11 file_extension IN ("encrypted","locked","crypt") | stats dc(dest_host) as affected_hosts, count as files_encrypted | timechart span=5m count

    Decision Point

    If: Encryption is still actively spreading

    Yes → Immediately isolate all systems that have not yet been encrypted. Consider emergency network segmentation.

    No → Encryption has stopped. Focus on determining backup integrity and data exfiltration evidence.

  4. 4

    Check for data exfiltration

    Modern ransomware groups almost always exfiltrate data before encrypting; this is the double extortion model. Search for large outbound data transfers, connections to cloud storage services, or archive file creation in the days before encryption began.

    FirewallSIEM
    index=firewall action=allowed dest_port IN (443, 80) | stats sum(bytes_out) as total_bytes by src_ip, dest_ip | where total_bytes > 1000000000 | sort -total_bytes
    index=endpoint process_name IN ("7z.exe","rar.exe","winrar.exe","tar.exe") | stats count by dest_host, command_line | sort -count
  5. 5

    Assess backup integrity and escalate

    Verify backup integrity: check if backups are offline/air-gapped and unaffected. Determine the most recent clean backup point. Escalate to incident response leadership with: affected systems count, backup status, exfiltration evidence, ransomware variant, and recommended recovery approach.

    SIEM

Common Mistakes

  1. 1

    Spending time analyzing the alert while encryption continues to spread; isolate FIRST, investigate second

  2. 2

    Shutting down affected systems, which destroys volatile memory evidence needed for forensics

  3. 3

    Assuming no data was exfiltrated because you only see encryption; double extortion is standard

  4. 4

    Not checking backup integrity immediately; attackers specifically target backup infrastructure

  5. 5

    Attempting to negotiate with or respond to the attacker without involving legal and leadership

Escalation Criteria

  • Any confirmed ransomware activity is an immediate escalation to incident response leadership

  • Evidence of data exfiltration adds legal and regulatory reporting requirements

  • Domain controller compromise means the entire Active Directory environment is at risk

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including ransomware activity investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

Should I shut down affected systems during a ransomware attack?
No. Isolate them from the network but do not shut them down. Shutting down destroys volatile memory evidence that forensic investigators need to determine the full attack chain. Use network isolation via XDR or physical network disconnection instead.
How do I know if data was exfiltrated?
Look for large outbound data transfers in firewall logs, connections to cloud storage or file-sharing services, and archive file creation (7zip, RAR) on compromised systems. Modern ransomware groups nearly always exfiltrate data before encryption as part of their double extortion strategy.
How do I practice ransomware investigations?
SOCSimulator includes multi-stage ransomware scenarios that simulate the full attack chain, from initial access through lateral movement to encryption. Practice the critical time-sensitive decisions in a safe environment. Start free forever.
Technique

Data Encrypted for Impact (T1486) — Detection Training

Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to …

Read more
Technique

Exfiltration Over Alternative Protocol (T1048) — Detection Training

Adversaries may steal data by exfiltrating it over a different protocol than that used for command and control. Data exf…

Read more
Technique

Command and Scripting Interpreter (T1059) — Detection Training

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…

Read more
Glossary

What is Ransomware? — SOC Glossary

Ransomware is malware that encrypts victim data or systems and demands payment (typically cryptocurrency) for the decryp…

Read more
Glossary

What is Exfiltration? — SOC Glossary

Data exfiltration is the unauthorized transfer of sensitive data from a victim environment to attacker-controlled infras…

Read more
Glossary

What is Incident Response? — SOC Glossary

Incident response (IR) is the structured process for preparing for, detecting, containing, eradicating, recovering from,…

Read more
Glossary

What is Containment? — SOC Glossary

Containment is the incident response phase focused on limiting the spread and impact of a confirmed security incident: i…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Career Path

DFIR Analyst Career Guide — Salary & Skills

DFIR Analysts combine forensic investigation with incident response. You collect and analyze digital evidence from compr…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more

We use cookies to improve your experience and measure usage. Learn more