Windows - File enrichment

Entities: Process name Log type: Windows Server

Playbook Description

This playbook automates forensic analysis by retrieving hashes and querying VirusTotal for reputation data. It validates Authenticode signatures and identifies files in suspicious directories to determine origin. Based on these findings, it classifies the file risk level as high, medium, or low, streamlining the prioritization of potential security threats.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Defense Evasion(TA0005) Masquerading(T1036) -
Defense Evasion(TA0005) Subvert Trust Controls(T1553) Code Signing(T1553.002)
Execution(TA0002) User Execution(T1204) Malicious File(T1204.002)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
(Detect) D3-Detect (File Analysis) D3-FA D3-FHA
(Detect) D3-Detect (File Analysis) D3-FA (File Content Analysis) D3-FCR
(Detect) D3-Detect (Process Analysis) D3-PA (Process Spawn Analysis) D3-PSA

Playbook input type

Log

Prerequisites

  • Windows Credentials - Go to Settings -> Devices -> Windows Devices.
  • Provide/update the credentials of the respective Windows device with admin privileges.

Playbook creation input

  • connectionName - Provide the VirusTotal connection name for executing the VirusTotal APIs.

Dependencies

Extensions:

  • virustotal_fileReputation
  • virustotal_calculateRiskScore

Utility:

  • utility_extractMaliciousEntitiesByRiskScore
  • utility_validateResponses
  • utility_filterByStartsWith
  • utility_filterByCriteria
  • utility_convertToString
  • utility_normalizeValue

Scripts

Script Name Description Arguments
GetFileHash.ps1 This script retrieves the hash of a specified file using the given algorithm. FilePaths, Algorithm
GetAuthenticodeSignature.ps1 Checks the Authenticode digital signature of one or more files. Returns whether each file is signable, whether its signature is valid, and signer certificate details (subject, issuer, thumbprint, validity dates) for validly signed files. JsonPathList

Connections

VirusTotal connection - Need to connect to VirusTotal API and fetch access key to check the malware IP/URL/file details.

Execution workflow

  • Converts file paths to string.
  • Retrieves file hashes via PS script.
  • Checks file reputation via VirusTotal and calculates risk scores.
  • Classifies files as malicious (≥3) or suspicious (≥2).
  • Maps hashes to file paths.
  • Validates authenticode signatures.
  • Normalizes paths and checks suspicious locations.
  • Correlates signals to classify risk as HIGH, MEDIUM, or LOW.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

If the file is confirmed to be malicious, block its execution and prevent access by non-admin users. Check and delete the file as required.