You might need to identify removable devices that were connected to computer or other network device when doing the following:
In order to execute this procedure in your environment, the following data, services, or apps are required:
- Splunk Enterprise or Splunk Cloud Platform
- System log data
A Windows desktop has been infected by ransomware that you believe might have been transmitted through a USB drive. You want to identify the drive.
To optimize the search shown below, you should specify an index and a time range.
- Run the following search:
- Expand a result and look at the registry_value_data field.
Here is an explanation of what each part of this search achieves. You can adjust this query based on the specifics of your environment.
Search only Windows Registry logs.
Search for a registry entry value specific to USB devices. If friendlyname doesn’t yield results, try other entries, as described in Microsoft documentation.
The value in the registry_value_data field is the name of the USB device. After you have identified the device, you might want to look at the host or src_ip fields in the search result to identify the machine the device was plugged into. You might also want to identify any files that were downloaded from the removable device.