Ransomware Incident Response Plan (IRP) / Runbook#
Objective#
Provide a structured workflow for responding to suspected ransomware incidents, coordinating investigation, containment, eradication, and recovery efforts using available tools and procedures. This runbook orchestrates various specialized runbooks.
Scope#
This runbook covers the end-to-end response lifecycle for ransomware incidents, from initial detection to post-incident review. It relies on specific sub-runbooks for detailed execution steps.
Phases (PICERL Model)#
Preparation: (Ongoing) Ensure tools are operational, backups are tested, relevant detections are active, and communication/escalation plans are clear.
Identification: Detect the incident, perform initial triage, identify the ransomware strain, determine initial scope, and investigate initial access/lateral movement.
Containment: Limit the scope and magnitude of the incident by isolating affected systems and blocking malicious network IOCs.
Eradication: Remove the ransomware and any associated persistence mechanisms.
Recovery: Restore affected systems to normal operation safely, potentially using backups or decryptors.
Lessons Learned (Post-Incident): Review the incident and response to identify improvements.
Inputs#
${CASE_ID}: The SOAR case ID created for or associated with the initial alert(s).${ALERT_GROUP_IDENTIFIERS}: Relevant alert group identifiers from the SOAR case.${INITIAL_INDICATORS}: Information about the initial detection, which could include:Alert details (e.g., EDR detection name, SIEM rule).
Affected endpoint(s) (
ENDPOINT_ID,ENDPOINT_TYPE).Observed file hashes (
FILE_HASH).Ransom note details (file names, contact info - handle with care).
Observed suspicious network connections (IPs/Domains).
Tools#
gti-mcp:get_file_report,search_threats(querying ransomware name/family),get_collection_report(for known families/actors).secops-mcp:search_security_events,lookup_entity.secops-soar:post_case_comment,get_case_full_details.Basic Endpoint Triage & Isolation Runbook:
../basic_endpoint_triage_isolation.md(Crucial for containment).IOC Containment Runbook:
../ioc_containment.md(For network IOCs).Compromised User Account Response Runbook:
../compromised_user_account_response.md(If initial access vector involves user).You may ask follow up question (To confirm actions, especially isolation).
(External Resources: Ransomware identification sites, known decryptor databases - manual step).
Common Steps:
common_steps/check_duplicate_cases.md,common_steps/find_relevant_soar_case.md,common_steps/document_in_soar.md
Workflow Steps & Diagram#
sequenceDiagram
participant Analyst
participant IRP as ransomware_response.md (This Runbook)
participant Preparation as Phase 1: Preparation
participant Identification as Phase 2: Identification
participant Containment as Phase 3: Containment
participant Eradication as Phase 4: Eradication
participant Recovery as Phase 5: Recovery
participant LessonsLearned as Phase 6: Lessons Learned
Analyst->>IRP: Start Ransomware Response\nInput: CASE_ID, ALERT_GROUP_IDS, INITIAL_INDICATORS
IRP->>Preparation: Verify Prerequisites (Ongoing)
Preparation-->>IRP: Readiness Confirmed (Backups, Tools, Plans)
IRP->>Identification: Execute Identification Steps
Identification-->>IRP: Findings (Strain, IOCs, Affected Entities, Initial Access Vector)
IRP->>Containment: Execute Containment Steps
Containment-->>IRP: Containment Status (Endpoints, IOCs, Users)
IRP->>Eradication: Execute Eradication Steps
Eradication-->>IRP: Eradication Status
IRP->>Recovery: Execute Recovery Steps
Recovery-->>IRP: Recovery Status
IRP->>LessonsLearned: Execute Post-Incident Steps
LessonsLearned-->>IRP: Review Complete
IRP-->>Analyst: Incident Response Complete
Phase 1: Preparation (Ongoing)#
Objective: Ensure readiness to respond to ransomware incidents.
Actions:
Verify tool connectivity.
Ensure regular, tested backups of critical systems exist.
Maintain asset inventory and network diagrams.
Ensure relevant detections for ransomware precursors (e.g., credential dumping, lateral movement tools, specific exploits) and known ransomware IOCs are active.
Review and understand communication, escalation (
.agentrules/escalation_paths.md), and potentially ransom payment decision-making procedures.
Phase 2: Identification#
Objective: Detect the incident, identify the ransomware strain, determine initial scope, and investigate initial access/lateral movement.
Sub-Runbooks/Steps:
Receive Input & Context: Obtain initial indicators,
${CASE_ID},${ALERT_GROUP_IDENTIFIERS}. Get case details viasoar-mcp_get_case_full_details. Check for duplicates (../common_steps/check_duplicate_cases.md).Identify Ransomware Strain:
If a file hash (
${FILE_HASH}) is available, usegti-mcp_get_file_reportto identify the malware family/ransomware name.If EDR alert name or ransom note details provide a name, use
gti-mcp_search_threats(e.g.,query="LockBit ransomware" collection_type:"malware-family") orget_collection_reportif a specific GTI ID is known.(Manual Step: Use external resources like ID Ransomware if GTI doesn’t yield results).
Document the identified (or suspected) strain (
IDENTIFIED_STRAIN).
Investigate Initial Access & Lateral Movement (SIEM):
Use
secops-mcp_search_security_eventsfocusing on the time before and during the initial encryption activity on the affected endpoints:Search for suspicious logins, RDP activity, or exploit attempts targeting the initially affected endpoints.
Search for execution of suspicious tools (PsExec, Cobalt Strike beacons, etc.).
Search for activity related to the user logged into the endpoint at the time of infection (potentially trigger
../compromised_user_account_response.md).Trace network connections from the affected endpoints to identify potential lateral movement targets.
Identify potential initial access vector (
INITIAL_ACCESS_VECTOR) and other potentially affected systems (POTENTIAL_ADDITIONAL_SYSTEMS).
Initial Scope Assessment:
Combine initial indicators with findings from step 3 to create a list of initially identified affected endpoints (
AFFECTED_ENDPOINTS) and potentially malicious network IOCs (MALICIOUS_IOCs).
Check Related SOAR Cases:
Prepare list of key entities:
SEARCH_TERMS = AFFECTED_ENDPOINTS + MALICIOUS_IOCs.Execute
../common_steps/find_relevant_soar_case.mdwithSEARCH_TERMSandCASE_STATUS_FILTER="Opened".Obtain
${RELATED_SOAR_CASES}(list of potentially relevant open case summaries/IDs).
Document Identification Phase:
Document findings (
IDENTIFIED_STRAIN,INITIAL_ACCESS_VECTOR,AFFECTED_ENDPOINTS,MALICIOUS_IOCs,${RELATED_SOAR_CASES}) using../common_steps/document_in_soar.md.
Phase 3: Containment#
Objective: Prevent the ransomware from spreading further and stop ongoing malicious activity.
Sub-Runbooks/Steps:
Isolate Affected Endpoints:
For each endpoint in
AFFECTED_ENDPOINTSandPOTENTIAL_ADDITIONAL_SYSTEMS:Execute
../basic_endpoint_triage_isolation.md. Prioritize immediate isolation confirmation with analyst.
Contain Network IOCs:
For each IOC in
MALICIOUS_IOCs:Execute
../ioc_containment.md. Confirm containment action with analyst.
Contain User Accounts (If Applicable):
If
INITIAL_ACCESS_VECTORinvolved a compromised user, ensure containment actions were taken via../compromised_user_account_response.md.
Verify Containment:
Monitor SIEM (
secops-mcp_search_security_events) for further encryption activity, C2 communication, or lateral movement attempts from contained systems/IOCs.Document containment status using
../common_steps/document_in_soar.md.
Phase 4: Eradication#
Objective: Remove the ransomware and any associated persistence mechanisms from affected systems.
Sub-Runbooks/Steps:
Identify Persistence:
Analyze findings from Phase 2 (GTI reports for the strain, SIEM searches) to identify known persistence TTPs for
IDENTIFIED_STRAIN.(Requires EDR/Forensic tools) Examine contained endpoints for specific persistence artifacts (scheduled tasks, services, registry keys, malicious processes).
Remove Ransomware & Persistence:
(Requires specific EDR/Endpoint Management tools or manual intervention)
Execute plan to remove ransomware executables, associated files, and persistence mechanisms from contained endpoints. Note: Re-imaging (Phase 5) is often preferred over cleaning for ransomware.
Scan for Residual Infection:
(Requires EDR/AV tools)
Perform thorough scans on affected systems post-eradication attempts (if cleaning was attempted).
Document Eradication:
Document actions taken and scan results using
../common_steps/document_in_soar.md.
Phase 5: Recovery#
Objective: Restore affected systems to normal operation safely.
Sub-Runbooks/Steps: (Placeholder - Requires dedicated Recovery Runbook)
Check Decryptor Availability: Based on
IDENTIFIED_STRAIN, check known decryptor availability (Manual Step: NoMoreRansom.org, vendor sites).Determine Recovery Strategy: Decide whether to rebuild systems from known-good backups (most common for ransomware) or attempt decryption/cleaning. Consider backup integrity and age.
Rebuild/Recover Systems: Execute the chosen strategy. (Likely involves IT Ops/System Admins).
Patch & Harden: Ensure recovered/rebuilt systems are fully patched and hardened before reconnecting. Perform vulnerability scans (
scc-mcpor other tools).Restore Data: Restore data from clean backups. Validate data integrity.
Monitor Systems: Closely monitor recovered systems for any signs of residual infection or abnormal behavior using SIEM/EDR.
Lift Containment: Gradually remove isolation measures once confidence in recovery is high.
Document Recovery: Document steps taken using
../common_steps/document_in_soar.md.
Phase 6: Lessons Learned (Post-Incident)#
Objective: Review the incident and response to identify areas for improvement.
Sub-Runbooks/Steps: (Placeholder - Requires dedicated Post-Incident Runbook)
Incident Review Meeting: Conduct a post-mortem meeting. Discuss initial access, spread, impact, response effectiveness, recovery success.
Analyze Response: Review timeline, tool effectiveness, runbook adherence.
Identify Gaps: Focus on prevention (how did it get in?), detection (was it detected quickly?), and response gaps.
Develop Recommendations: Suggest improvements (e.g., security control changes, new detections, backup strategy review, user training).
Update Documentation: Update runbooks, policies, etc.
Track Recommendations: Assign and track implementation.
Final Report: Generate using guidelines from
rules-bank/reporting_templates.mdand../report_writing.md.Document Review: Document outcomes using
../common_steps/document_in_soar.md.
Phase 7: Lessons Learned / Runbook Feedback#
Objective: Capture feedback on the runbook’s effectiveness and identify areas for improvement based on this incident.
Actions:
Runbook Effectiveness:
Did this runbook accurately guide the response?
Were there any unclear or missing steps?
Did the tools function as expected based on the runbook steps?
Tool Performance:
Were there any issues with specific MCP tool calls (errors, unexpected results, rate limits)?
Did the tool outputs provide the necessary information?
Process Gaps:
Did the incident reveal gaps in detection, prevention, or other related processes?
Suggestions for Improvement:
Specific recommendations for updating this runbook.
Suggestions for new detection rules or tuning existing ones.
Recommendations for tool configuration changes or new tool requirements.
Documentation: Record this feedback within the SOAR case (
${CASE_ID}) usingcommon_steps/document_in_soar.mdor a dedicated lessons learned repository.
Rubrics#
The following rubric is used to evaluate the execution of this Triage/Response runbook by an LLM agent.
Grading Scale (0-100 Points)#
Criteria |
Points |
Description |
|---|---|---|
Context & Enrichment |
25 |
Correctly extracted entities and enriched them with relevant context (GTI, SIEM). |
Analysis & Decision |
25 |
Analyzed the enriched data to make a sound decision (FP/TP, Escalate/Close). |
Action Execution |
20 |
Performed the required response actions (e.g., isolation, containment) correctly. |
Documentation |
15 |
Clearly documented findings and actions in the case/ticket. |
Operational Artifacts |
15 |
Produced required artifacts: Sequence diagram, execution metadata (date/cost), and summary. |
Evaluation Criteria Details#
1. Context & Enrichment (25 Points)#
10 pts: Accurately extracted key entities (IPs, users, hashes) from the input.
15 pts: Performed necessary enrichment (e.g.,
enrich_ioc) to gather reputation and history.
2. Analysis & Decision (25 Points)#
15 pts: Interpreted the context correctly to determine the nature of the alert.
10 pts: Reached a logical conclusion or next step (e.g., “Escalate to Tier 2” or “Isolate Host”).
3. Action Execution (20 Points)#
10 pts: Called the correct tools to perform response actions (if applicable) or investigative steps.
10 pts: Verified the success of actions or handled errors appropriately.
4. Documentation (15 Points)#
15 pts: Posted a comprehensive comment or update to the SOAR case summarizing the triage.
5. Operational Artifacts (15 Points)#
5 pts: Sequence Diagram: Produced a Mermaid sequence diagram visualizing the steps taken.
5 pts: Execution Metadata: Recorded the date, duration, and estimated token cost.
5 pts: Summary Report: Generated a concise summary of the actions and outcomes.