A user’s system has been infected with ransomware. You suspect that the source was a file the user downloaded from a suspicious website.
Run the following search. You can optimize it by specifying an index and adjusting the time range.
sourcetype=stream:http src=<IP address of infected machine> |stats count values(url) BY dest
The table provides an explanation of what each part of this search achieves. You can adjust this query based on the specifics of your environment.
Search only web traffic data from Splunk Stream logs.
src=<IP address of infected machine>
Search logs coming from the infected machine.
|stats count values(url) BY dest
Return all visited URLs, grouped by destination IP address, with a total count.
The results show files that were downloaded to the user’s machine as a result of websites he visited. If you see the suspicious file associated with the same domains across multiple log source types, you can have a fair amount of confidence that it’s the file you want. However, you should also take the folllowing steps:
- Research suspicious file names to see if they have been reported elsewhere.
- Corroborate your findings using other sourcetypes.
- Research key attributes. Many security firms blog about popular implementations of ransomware or malware.
When you know more about the file, you can determine the appropriate steps to take.
Finally, you might be interested in other processes associated with the Investigating a ransomware attack use case.