Artifact Scoring

Make your investigations faster by letting Cyber Triage score the artifacts so that you can start with the most important clues first.

Rapidly Prioritize Thousands of Artifacts

  • Bad items are related to past intrusions and should be the first clues you look into
  • Suspicious items could be the attacker trying to blend in and are your 2nd priority
  • Good items aren’t worth your precious time.

Leverage Comprehensive Threat Intelligence

  • Malware scanning from 40+ engines
  • Yara to integrate cutting-edge rules
  • Heuristics that experienced responders look for, such as anomalous processes
  • Import IOC threat intelligence lists.

Get Context on the Clues

  • Use the Timeline to see what happened before and after a given event
  • See what other files are stored alongside malware and other suspicious files with File Explorer
  • You can easily pivot data types to learn about related artifacts, such a network connection associated with a file.

Scored Artifact Details

  • Files with malware based on results from multiple ReversingLabs engines
  • Known bad files and other items based on IOCs and blacklists
  • Windows processes that were tampered with by verifying parent hierarchy and owner
  • Programs and scheduled tasks that were run out of uncommon locations
  • Startup programs, services, or drivers in uncommon locations or that are not signed
  • Processes with names that are too similar to normal Windows processes
  • Processes that could have been exploited and are now running command prompts
  • Active network connections to uncommon remote ports
  • Listening ports on uncommon local ports
  • Remote desktop connections with suspicious users and settings
  • User accounts with abnormal behaviors and failed logins
  • Executable files hidden in NTFS Alternate Data Streams
  • Executable files that have suspicious structure and settings
  • Encrypted archive files that could be from data exfiltration
  • Known good operating system and application files based on MD5 hash values and NIST NSRL and ignore them; this reduces the amount of data that needs to be analyzed and reviewed
  • For more details, including a complete list of scored artifacts, contact us.