Use Host Log Data to Evaluate System Processes for Signs of Malicious Activity
Given a suspected compromised Windows desktop computer system, local administrator account credentials, one or more Indicators of Compromise (IOCs), and incident response software.
The team member uses incident response software to collect the following:
Log and text file entries are found and correlated to potential malicious behavior or known IOCs.
# List running processes with PID, username and command line
Get-WmiObject Win32_Process | Select-Object Name, ProcessId, CommandLine
# List network connections with process info
Get-NetTCPConnection | Select-Object LocalAddress, LocalPort, RemoteAddress, State, OwningProcess
# List auto-start locations
Get-ItemProperty -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Run"
# List scheduled tasks
Get-ScheduledTask | Select-Object TaskName, State
# List running processes
ps aux
# List network connections
ss -tulnp
# List open files and network
lsof -i
# List autoruns (Linux example: cron jobs)
crontab -l
# Export event logs
wevtutil epl Security Security.evtx
wevtutil epl System System.evtx
wevtutil epl Application Application.evtx
# Display failed logons
Get-WinEvent -FilterHashtable @{LogName='Security';ID=4625} | Format-List
# Simple PowerShell collection script
Get-Process | Out-File C:\IR\process_list.txt
Get-NetTCPConnection | Out-File C:\IR\network_connections.txt
Get-ScheduledTask | Out-File C:\IR\scheduled_tasks.txt
Get-WinEvent -LogName Security -MaxEvents 1000 | Out-File C:\IR\security_events.txt
Operator Note: Use IR Collection Frameworks like Velociraptor for automated and scalable host data acquisition when available.
Tool | Platform | Installation | Usage |
---|---|---|---|
Sysinternals Suite | Windows | Download | Comprehensive host analysis |
Velociraptor | Cross-platform | Deploy agent | Enterprise-scale host forensics |
OSQuery | Cross-platform | Install agent | SQL-based query of host data |
PowerShell | Windows | Built-in | Scripting and host interrogation |
lsof, ps, netstat | Linux/macOS | Built-in | Process and network analysis |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Corrected and expanded operator version with deep host process analysis guidance | Leo |