• Home
  • Play books
  • Bitdefender - Trusted binary investigation and containment

Bitdefender - Trusted binary investigation and containment

Entities: IP, Process name Log type: Bitdefender

Playbook Description

This playbook automates the end-to-end response for suspicious binaries. It retrieves process metadata, analyzes command-line arguments, and verifies file path and URL reputations. Once threats are confirmed, it triggers automated defenses such as killing malicious processes, adding files to blocklists, and running full system scans. It concludes by quarantining files and isolating compromised hosts to prevent lateral movement.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Execution(TA0002) Command and Scripting Interpreter (T1059) PowerShell(T1059.001)

MITRE D3FEND mapping

Tactics Techniques
Isolate(D3-Isolate) D3-NI
Evict(D3-Evict) D3-PE

Playbook input type

Alert

Prerequisites

Need license with plan - Business Security Enterprise.

Playbook creation input

connectionName - Connection name of Bitdefender.

Dependencies

Extensions - Bitdefender

  • bitdefender_addFileToQuarantineTask
  • bitdefender_killProcess
  • bitdefender_createIsolateEndpoint
  • bitdefender_addToBlocklist

Extensions - VirusTotal

  • virustotal_ipReputation
  • virustotal_fileReputation
  • virustotal_calculateRiskScore

Utility functions

  • windows_commandLineAnalysis
  • bitdefender_buildBlockRule
  • utility_extractMaliciousEntitiesByRiskScore
  • utility_convertToString
  • utility_getRequiredTime
  • utility_validateResponses

Scripts

Script Name Description Arguments
GetFileHash.ps1 This script retrieves the hash of a specified file using the given algorithm. FilePaths, Algorithm

Connections

  • VirusTotal connection: Need to connect with VirusTotal API and fetch access key to check the malware IP/URL/File details.
  • Bitdefender connection: Need to connect Bitdefender using API Key.

Sub playbooks

Bitdefender - Scan task execution
VirusTotal - URL reputation check

Execution workflow

Investigation:

  • Analyzes the command line and fetches the URL or file path.
  • If a URL or file path exists, get its reputation using VirusTotal.
  • Fetches the involved process details from the log.

Decision logic:

  • If file path or URL risk score is high, it might be malicious, so proceeds with remediation.

Remediation:

  • Checks the IP reputation and if remote IP is involved, blocks the malicious IP.
  • Kills the process and its parent process.
  • Quarantines the process file.
  • Adds the malicious file path to blocklist.
  • Runs full scan for the endpoint and check the risk score.
  • Isolates the host if risk score is high.
  • Notifies the users.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

Steps to revert false positives:

  • Remove file from blocklist.
  • Remove the host from isolation.
  • Remove the file from quarantine.