All main steps of the SOP may not be always required: as soon as there is a detection, security analysts may want to stop there and have the sample analyzed (or do the analysis on their own). But depending on the context, one may want to go through the end of the SOP anyhow after a detection, or not.
- Force the update of the locally installed AV
- Start a full scan with locally installed AV.
- Run a third-party lightweight antimalware
- My recommendation: ESET Online Scanner or WithSecure Online Scanner
- My recommendation: Microsoft Safety Scanner or ESET Online Scanner or Sophos virus removal tool
- My recommendation: Windows Defender Offline or ESET SysRescue Live
- Try not to delete the file, and grab the sample;
- Send the sample to the support of the AV solution that was not detecting it;
- Add the IOC (file hash) to your TIP.
- My recommendation: Thor Lite
- Don't forget to extract your own IOC that are stored and updated within your TIP (either MISP or OpenCTI), and add them to Thor Lite
- Try not to delete the file, and grab the sample;
- Send the sample to the support of the AV solution that was not detecting it;
- Add the IOC (file hash) to your TIP.
- My recommendations: Process Explorer, Autoruns, TCPView
- you may also want to leverage Process Monitor, but be aware it will consume quite some resources on the machine being analyzed, and the trace is likely to take time to analyze (hours if not days)
- Run the recommended SysInternals tools (as local admin);
- Check for suspicious activity:
- check all images of running processes and DLL:
- unsigned binaries;
- abnormal execution paths;
- query VirusTotal (see Process Explorer options) for all binaries (exe/dll);
- check all network activity (destination IP);
- check for suspicious persistance items (using Autoruns);
- check for suspicious filesystem activity.
- check all images of running processes and DLL:
- Grab the sample and send it to the support of the AV vendor that was not detecting it;
- Add the IOC (file hash) to your TIP.
- My recommendation: GMER
- Do a full memory dump with the tool of your choosing
- Run an analysis of the memory dump
- My recommendation: Volatility
Be aware that this analysis step may require hours if not days, and is quite non-predictable in terms of required time!