Investigation Guide
Guide to investigating SIEM alerts with centralized logging implemented
First Steps: Information Gathering
Check the alert information. What rule was set off? What is the process? What is the parent process?
Analysis of Basic Info
If you're not sure what the rule does by the title, take a look at the query. If the alert seems like it's off, check that the log does, in fact, match the given query. It may not and you may have an issue with your SIEM queries.
Verify Processes
If a process has a file associated with it (ex. update.exe), run that file hash through a tool like VirusTotal to verify its legitimacy.
If a process has a working directory, confirm that directory with research or testing. For example, if it's a Chrome installation, research will help determine where Chrome should be installing, or you can download Chrome and install it (preferably on a virtual machine built for testing).
Paring Down
Investigations can start broad. A preferred way to start an investigation is with the hostname of the device that the activity was occurring on. While lateral movement may have occurred, suspicious activity on a single host is a solid indicator of compromise. Then, step by step, pare down the search query to more and more specific fields as you hone in on suspicious activity (or a lack of). A suggested investigation path is:
Filter by hostname(s)
Filter out automatic or familiar processes
Filter for username(s)
Filter for unfamiliar or suspicious processes
Last updated