Skip to main content
Splunk Lantern

Removable devices connected to a machine


A Windows desktop has been infected by ransomware that you believe might have been transmitted through a USB drive. You want to identify the drive. 

Required data

System log data


  1. Run the following search. You can optimize it by specifying an index and adjusting the time range.
    sourcetype=winregistry friendlyname
  2. Expand the result and look at the registry_value_data field. 

Search explanation

Here is an explanation of what each part of this search achieves. You can adjust this query based on the specifics of your environment.

Splunk Search Explanation


Search only Windows Registry logs.


Search for a registry entry value specific to USB devices. If friendlyname doesn’t yield results, try other entries, as described in Microsoft documentation.  

Next steps

The value in the registry_value_data field is the name of the USB device. After you have identified the device, you might want to look at the host or src_ip fields in the search result to identify the machine the device was plugged into. You might also want to identify any files that were downloaded from the removable device

Finally, you might be interested in other processes associated with Investigating a ransomware attack.