IncidentResponsev2

4.07 Use Host Log Data to Evaluate System Processes

Task

Use Host Log Data to Evaluate System Processes for Signs of Malicious Activity

Conditions

Given a suspected compromised Windows desktop computer system, local administrator account credentials, one or more Indicators of Compromise (IOCs), and incident response software.


Standards


End State

Log and text file entries are found and correlated to potential malicious behavior or known IOCs.


Notes


Manual Steps

Step 1: Prepare Collection Tools


Step 2: Collect System Process and Host Information

Windows (PowerShell examples)

# List running processes with PID, username and command line
Get-WmiObject Win32_Process | Select-Object Name, ProcessId, CommandLine

# List network connections with process info
Get-NetTCPConnection | Select-Object LocalAddress, LocalPort, RemoteAddress, State, OwningProcess

# List auto-start locations
Get-ItemProperty -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Run"

# List scheduled tasks
Get-ScheduledTask | Select-Object TaskName, State

Linux/macOS

# List running processes
ps aux

# List network connections
ss -tulnp

# List open files and network
lsof -i

# List autoruns (Linux example: cron jobs)
crontab -l

Step 3: Collect and Analyze Windows Event Logs

# Export event logs
wevtutil epl Security Security.evtx
wevtutil epl System System.evtx
wevtutil epl Application Application.evtx

# Display failed logons
Get-WinEvent -FilterHashtable @{LogName='Security';ID=4625} | Format-List

Step 4: Collect Additional Metadata


Step 5: Cross-reference Collected Data with IOCs


Step 6: Save and Export Findings


Running Script Example (Automated Collection)

# Simple PowerShell collection script
Get-Process | Out-File C:\IR\process_list.txt
Get-NetTCPConnection | Out-File C:\IR\network_connections.txt
Get-ScheduledTask | Out-File C:\IR\scheduled_tasks.txt
Get-WinEvent -LogName Security -MaxEvents 1000 | Out-File C:\IR\security_events.txt

Operator Note: Use IR Collection Frameworks like Velociraptor for automated and scalable host data acquisition when available.


Dependencies


Other Available Tools

Tool Platform Installation Usage
Sysinternals Suite Windows Download Comprehensive host analysis
Velociraptor Cross-platform Deploy agent Enterprise-scale host forensics
OSQuery Cross-platform Install agent SQL-based query of host data
PowerShell Windows Built-in Scripting and host interrogation
lsof, ps, netstat Linux/macOS Built-in Process and network analysis

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Corrected and expanded operator version with deep host process analysis guidance Leo