Splunk SOAR Playbook of the Month: Investigations with Playbooks

It comes as no surprise that analysts spend a lot of their time investigating and responding to a continuous flood of incidents on a daily basis. While the sheer volume of alerts alone make for a time consuming endeavor, trying to manually tackle so many of these alerts results in slow incident response and can trap your team into a series of reactive security operations.

Splunk SOAR can help analysts better examine and investigate potential threats and improve their approach to threat triage through the power of automation. For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.

The Playbook

The Internal Host WinRM Investigate Playbook performs a general investigation on key aspects of a windows device using windows remote management. Important files related to the endpoint are generated, bundled into a zip, and copied to the container vault. Prior to running the playbook, there are a few additional steps that you can take to help improve how Splunk SOAR can identify possible indicators of compromise.

Getting Started

  1. From the artifacts tab, click on artifact from an alert to and review the description of the potentially malicious activity
  2. Click the fileHash value, then click on the Run Action tab on the window that appears.
  3. Click the Investigate drop down option and select file reputation from the list of actions. In the run action window that appears, select your file reputation program and click Launch to run a report. For this example, we’ll be using VirusTotal
  4. Once the report is generated, review the results to confirm if the process in question is malicious. If so, the next step is to update your IoCs.

Updating Your IoCs

  1. From the report you ran, look at the resource section of the report to see the hash you ran a query on. Click the hash and from the overview window that appears, click the +Tag button.
  2. This opens the Edit Tags window. From here, you can adjust your tags to include things like “Suspicious,” “virustotal,” and “high_risk_score.” Once you’ve added your tags, click the save button.
  3. This will increase the library of indicators that Splunk SOAR has access to.

Running the Playbook

  1. Click the Playbook button on your navigation bar and search for the WinRM Investigate Host playbook.
  2. Click the Run Playbook button to generate a capture of all hosts related to the incident. Your analyst screen will start to show services, processes, and sessions. This allows you to easily review for potential malicious activities based on your earlier investigation.
  3. Splunk SOAR will also run an additional data collection script and provides you with a ZIP file with even more data on the queried system.

Watch the video to see this playbook and setup process in action.

YouTube video player

By using this playbook, you can get a more holistic snapshot of your endpoints and gain valuable insights into potential malicious threats that might be affecting them.

Be sure to check out research.splunk.com/playbooks to explore even more useful playbooks. Additionally, if you haven’t seen last month’s blog and video, be sure to give them a look here. We look forward to hearing about your experience with this month’s featured playbook as well as any other playbooks you’ve recently implemented. We’ll be back next month with more playbooks and demos, but until then, get out there and get automating!

Related Articles

Easily Automate Across Your AWS Environments with Splunk Phantom
Security
2 Minute Read

Easily Automate Across Your AWS Environments with Splunk Phantom

Splunk Phantom now has the flexibility to let you easily manage your AWS environment across hundreds or thousands of accounts – read on to learn more.
Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future
Security
2 Minute Read

Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

Cisco announces it intent to acquire threat detection and defense company SnapAttack, driving further Splunk innovation to power the SOC of the future.
Security Insights: JetBrains TeamCity CVE-2024-27198 and CVE-2024-27199
Security
9 Minute Read

Security Insights: JetBrains TeamCity CVE-2024-27198 and CVE-2024-27199

The Splunk Threat Research Team examines exploit operations, analytics, hunting queries, and tips on capturing TeamCity logs.