CG
SkillsBuilding SOC Playbook for Ransomware
Start Free
Back to Skills Library
Security Operations๐ŸŸก Intermediate

Building SOC Playbook for Ransomware

Builds a structured SOC incident response playbook for ransomware attacks covering detection, containment, eradication, and recovery phases with specific SIEM queries, isolation procedures, and decision trees.

6 min read13 code examples1 MITRE techniques

Prerequisites

  • SIEM platform (Splunk ES, Elastic Security, or Sentinel) with endpoint and network data
  • EDR solution (CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint) with network isolation capability
  • Backup infrastructure with tested recovery procedures and offline/immutable backups
  • Communication plan with legal, executive leadership, and external IR retainer contacts
  • MITRE ATT&CK knowledge for ransomware technique chains

MITRE ATT&CK Coverage

T1490

Building SOC Playbook for Ransomware

When to Use

Use this skill when:

  • SOC teams need a standardized ransomware response playbook for Tier 1-3 analysts
  • An organization lacks documented procedures for ransomware containment and recovery
  • Tabletop exercises reveal gaps in ransomware response coordination
  • Compliance requirements (NIST CSF, ISO 27001) mandate documented incident playbooks

Do not use during an active ransomware incident as the sole guide โ€” have pre-built playbooks tested and rehearsed before incidents occur.

Prerequisites

  • SIEM platform (Splunk ES, Elastic Security, or Sentinel) with endpoint and network data
  • EDR solution (CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint) with network isolation capability
  • Backup infrastructure with tested recovery procedures and offline/immutable backups
  • Communication plan with legal, executive leadership, and external IR retainer contacts
  • MITRE ATT&CK knowledge for ransomware technique chains

Workflow

Step 1: Define Detection Triggers

Create SIEM detection rules for early ransomware indicators:

Mass File Encryption Detection (Splunk):

index=sysmon EventCode=11
| bin _time span=1m
| stats dc(TargetFilename) AS unique_files, values(TargetFilename) AS sample_files by Computer, Image, _time
| where unique_files > 100
| eval suspicious_extensions = if(match(mvjoin(sample_files, ","), "\.(encrypted|locked|crypt|enc|ransom)"), "YES", "NO")
| where suspicious_extensions="YES" OR unique_files > 500
| sort - unique_files

Shadow Copy Deletion (T1490):

index=wineventlog sourcetype="WinEventLog:Security" OR index=sysmon EventCode=1
(CommandLine="*vssadmin*delete*shadows*" OR CommandLine="*wmic*shadowcopy*delete*"
 OR CommandLine="*bcdedit*/set*recoveryenabled*no*" OR CommandLine="*wbadmin*delete*catalog*")
| table _time, Computer, User, ParentImage, Image, CommandLine

Ransomware Note File Creation:

index=sysmon EventCode=11
TargetFilename IN ("*README*.txt", "*DECRYPT*.txt", "*RANSOM*.txt", "*RECOVER*.html", "*HOW_TO*.txt")
| stats count by Computer, Image, TargetFilename
| where count > 5

Elastic Security EQL variant:

sequence by host.name with maxspan=2m
  [process where event.type == "start" and
    process.args : ("*vssadmin*", "*delete*", "*shadows*")]
  [file where event.type == "creation" and
    file.name : ("*README*DECRYPT*", "*RANSOM*", "*HOW_TO_RECOVER*")]

Step 2: Build Triage Decision Tree

RANSOMWARE ALERT TRIAGE
โ”‚
โ”œโ”€โ”€ Is encryption actively occurring?
โ”‚   โ”œโ”€โ”€ YES โ†’ IMMEDIATE: Isolate host from network (Step 3)
โ”‚   โ”‚         Do NOT power off (preserve memory for forensics)
โ”‚   โ””โ”€โ”€ NO โ†’ Is this a pre-encryption indicator?
โ”‚       โ”œโ”€โ”€ Shadow copy deletion โ†’ HIGH PRIORITY: Isolate and investigate
โ”‚       โ”œโ”€โ”€ Known ransomware hash โ†’ HIGH PRIORITY: Block hash, scan enterprise
โ”‚       โ””โ”€โ”€ Suspicious process behavior โ†’ MEDIUM: Investigate, prepare isolation
โ”‚
โ”œโ”€โ”€ How many hosts affected?
โ”‚   โ”œโ”€โ”€ Single host โ†’ Contained incident, follow host isolation procedure
โ”‚   โ”œโ”€โ”€ Multiple hosts (2-10) โ†’ Escalate to Tier 2, begin enterprise-wide scan
โ”‚   โ””โ”€โ”€ Enterprise-wide (>10) โ†’ Activate full IR team, engage external retainer
โ”‚
โ””โ”€โ”€ Is data exfiltration confirmed?
    โ”œโ”€โ”€ YES โ†’ Double extortion scenario, engage legal for breach notification
    โ””โ”€โ”€ NO/UNKNOWN โ†’ Check for Cobalt Strike/C2 beacons, review outbound transfers

Step 3: Containment Procedures

Network Isolation via EDR (CrowdStrike Falcon):

# Isolate host using CrowdStrike Falcon API
curl -X POST "https://api.crowdstrike.com/devices/entities/devices-actions/v2?action_name=contain" \
  -H "Authorization: Bearer $TOKEN" \
  -H "Content-Type: application/json" \
  -d '{"ids": ["device_id_here"]}'

Network Isolation via Microsoft Defender for Endpoint:

# Isolate machine via MDE API
$headers = @{Authorization = "Bearer $token"}
$body = @{Comment = "Ransomware containment - IR-2024-0500"; IsolationType = "Full"} | ConvertTo-Json
Invoke-RestMethod -Uri "https://api.securitycenter.microsoft.com/api/machines/$machineId/isolate" `
    -Method Post -Headers $headers -Body $body -ContentType "application/json"

Firewall Emergency Rules:

# Palo Alto โ€” Block SMB lateral spread
set rulebase security rules RansomwareContainment from Trust to Trust
set rulebase security rules RansomwareContainment application ms-ds-smb
set rulebase security rules RansomwareContainment action deny
set rulebase security rules RansomwareContainment disabled no
commit

Active Directory Emergency Actions:

# Disable compromised account
Disable-ADAccount -Identity "compromised_user"

# Reset Kerberos TGT (if domain admin compromised)
# WARNING: This resets krbtgt and requires two resets 12+ hours apart
Reset-KrbtgtKeys -Server "DC-PRIMARY" -Force

# Block lateral movement by disabling remote services
Set-Service -Name "RemoteRegistry" -StartupType Disabled -Status Stopped

Step 4: Evidence Collection and Preservation

Collect forensic artifacts before remediation:

# Capture running processes and network connections
Get-Process | Export-Csv "C:\IR\processes_$(hostname).csv"
Get-NetTCPConnection | Export-Csv "C:\IR\netstat_$(hostname).csv"

# Capture memory dump (if host still running)
winpmem_mini_x64.exe C:\IR\memory_$(hostname).raw

# Collect ransomware artifacts
Copy-Item "C:\Users\*\Desktop\*README*" "C:\IR\ransom_notes\" -Recurse
Copy-Item "C:\Users\*\Desktop\*.encrypted" "C:\IR\encrypted_samples\" -Force

# Capture event logs
wevtutil epl Security "C:\IR\Security_$(hostname).evtx"
wevtutil epl System "C:\IR\System_$(hostname).evtx"
wevtutil epl "Microsoft-Windows-Sysmon/Operational" "C:\IR\Sysmon_$(hostname).evtx"

Step 5: Eradication and Recovery

Identify ransomware variant:

  • Upload encrypted sample and ransom note to ID Ransomware (https://id-ransomware.malwarehunterteam.com/)
  • Check No More Ransom Project (https://www.nomoreransom.org/) for available decryptors
  • Search for ransomware family IOCs in MalwareBazaar

Enterprise-wide IOC scan in Splunk:

index=sysmon (EventCode=1 OR EventCode=11 OR EventCode=3)
(TargetFilename="*ransomware_binary_name*" OR sha256="KNOWN_HASH"
 OR DestinationIp="C2_IP_ADDRESS" OR CommandLine="*malicious_command*")
| stats count by Computer, EventCode, Image, CommandLine
| sort - count

Recovery from backups:

  1. Verify backup integrity (offline/immutable backups not affected)
  2. Rebuild affected systems from known-good images
  3. Restore data from last clean backup
  4. Validate restored systems before reconnecting to network
  5. Monitor restored systems for 72 hours for reinfection

Step 6: Post-Incident Documentation

Structure the playbook conclusion with lessons learned:

POST-INCIDENT REVIEW TEMPLATE
1. Timeline of events (detection to full recovery)
2. Initial access vector identification
3. Dwell time analysis (time from initial compromise to encryption)
4. Detection gaps identified
5. Response effectiveness metrics (MTTD, MTTC, MTTR)
6. Playbook improvements recommended
7. New detection rules deployed
8. Backup and recovery procedure updates

Key Concepts

TermDefinition
Double ExtortionRansomware tactic combining data encryption with data theft, threatening public release if ransom unpaid
Dwell TimeDuration between initial compromise and detection โ€” ransomware operators average 5-9 days before encryption
MTTCMean Time to Contain โ€” time from detection to successful isolation of affected systems
Kill ChainRansomware progression: Initial Access -> Execution -> Persistence -> Privilege Escalation -> Lateral Movement -> Collection -> Exfiltration -> Impact
Immutable BackupBackup storage that cannot be modified or deleted for a defined retention period (WORM storage)
RTO/RPORecovery Time Objective / Recovery Point Objective โ€” maximum acceptable downtime and data loss thresholds

Tools & Systems

  • CrowdStrike Falcon / SentinelOne: EDR platforms with network isolation, process kill, and threat hunting capabilities
  • Splunk ES / Elastic Security: SIEM platforms for detection rule deployment and enterprise-wide IOC scanning
  • ID Ransomware: Online service identifying ransomware variants from encrypted file samples and ransom notes
  • No More Ransom Project: Europol-backed initiative providing free decryption tools for known ransomware families
  • Veeam / Rubrik: Enterprise backup solutions with immutable backup support and instant recovery capabilities

Common Scenarios

  • LockBit Attack: Detected via SMB lateral movement and mass file encryption โ€” isolate, scan for Cobalt Strike beacons
  • BlackCat/ALPHV: Detected via ransomware note creation โ€” check for data exfiltration via Rclone or Mega upload
  • Conti/Royal: Detected via shadow copy deletion โ€” check for prior BazarLoader/Emotet initial access
  • RansomHub: Detected via anomalous process execution โ€” investigate for compromised VPN or RDP credentials
  • Play Ransomware: Detected via service account abuse โ€” audit AD for newly created accounts and group membership changes

Output Format

RANSOMWARE PLAYBOOK EXECUTION โ€” IR-2024-0500
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Phase 1 - Detection:
  Alert:      Mass file encryption detected on FILESERVER-03
  Variant:    LockBit 3.0 (confirmed via ID Ransomware)
  MTTD:       12 minutes from first encryption to SOC alert

Phase 2 - Containment:
  [DONE] FILESERVER-03 isolated via CrowdStrike at 14:35 UTC
  [DONE] SMB blocked enterprise-wide via firewall emergency rule
  [DONE] Compromised service account disabled in AD
  MTTC:       23 minutes

Phase 3 - Eradication:
  [DONE] 3 additional hosts with C2 beacon identified and isolated
  [DONE] Cobalt Strike C2 domain (c2[.]evil[.]com) sinkholed
  [DONE] Enterprise-wide IOC scan completed โ€” no additional infections

Phase 4 - Recovery:
  [DONE] FILESERVER-03 rebuilt from gold image
  [DONE] Data restored from immutable Veeam backup (RPO: 4 hours)
  [DONE] Systems monitored 72 hours โ€” no reinfection
  MTTR:       18 hours

Total Affected: 1 server, 3 workstations
Data Loss:      4 hours of file modifications (backup RPO)
Exfiltration:   No evidence of data exfiltration confirmed

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection), CC7.3 (Incident Identification)
  • ISO 27001: A.12.4 (Logging & Monitoring), A.16.1 (Security Incident Management)
  • NIST 800-53: AU-6 (Audit Review), SI-4 (System Monitoring), IR-5 (Incident Monitoring)
  • NIST CSF: DE.AE (Anomalies & Events), DE.CM (Continuous Monitoring)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add building-soc-playbook-for-ransomware

# Or load dynamically via MCP
grc.load_skill("building-soc-playbook-for-ransomware")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact โ€” successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add building-soc-playbook-for-ransomware
// Or via MCP
grc.load_skill("building-soc-playbook-for-ransomware")

Tags

socransomwareincident-responseplaybooknistmitre-attackcontainment

Related Skills

Security Operations

Implementing SOAR Automation with Phantom

6mยทintermediate
Security Operations

Performing SOC Tabletop Exercise

10mยทintermediate
Security Operations

Analyzing Windows Event Logs in Splunk

5mยทintermediate
Security Operations

Building Detection Rules with Sigma

5mยทintermediate
Security Operations

Building Incident Response Dashboard

6mยทintermediate
Security Operations

Implementing MITRE ATT&CK Coverage Mapping

5mยทintermediate

Skill Details

Domain
Security Operations
Difficulty
intermediate
Read Time
6 min
Code Examples
13
MITRE IDs
1

On This Page

When to UsePrerequisitesWorkflowKey ConceptsTools & SystemsCommon ScenariosOutput FormatVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free โ†’