Skip to content

Ransomware Kill Chain Reconstruction

Ransomware incidents demand a structured approach to timeline analysis. The attacker lifecycle -- from initial access through privilege escalation, lateral movement, defense evasion, staging, and encryption -- leaves artifacts spread across dozens of log sources and host forensic images. This guide walks through reconstructing a complete ransomware kill chain using IRFlow Timeline.

Features Used

Prerequisites

Before starting, collect the following from each affected endpoint using KAPE or a similar triage tool:

  • Windows Event Logs (EVTX) -- Security, System, Sysmon, PowerShell, Defender
  • MFT and USN Journal
  • Prefetch files
  • Amcache and Shimcache
  • Registry hives (SYSTEM, SOFTWARE, NTUSER.DAT, UsrClass.dat)
  • SRUM database

Process the collected artifacts through the appropriate EZ Tools (EvtxECmd, MFTECmd, PECmd, AmcacheParser, RECmd, AppCompatcache, SrumECmd) to produce CSV output that IRFlow Timeline can ingest.

Phase Tags

Throughout this workflow, use the following tags to classify artifacts by kill chain phase. Create these tags in the Bookmarks and Tags panel before you begin:

TagKill Chain PhaseColor
initial-accessPhishing, exploit, or external service compromiseRed
executionFirst-stage payload and script executionOrange
persistenceScheduled tasks, services, registry run keysYellow
priv-escPrivilege escalation to SYSTEM or Domain AdminPurple
lateral-movementRDP, PsExec, WMI, SMB activity between hostsBlue
defense-evasionLog clearing, AV tampering, timestompingPink
exfiltrationData staging and outbound transferCyan
encryptionRansomware binary execution and file modificationBlack

1. Build a Unified Super-Timeline

Open each KAPE-processed CSV in its own tab. IRFlow Timeline's KAPE Integration will auto-detect the tool profile and apply optimized column layouts for EvtxECmd, MFTECmd, PECmd, and others.

Once all tabs are loaded, use Merge Tabs to combine them into a single unified timeline. Select all tabs and choose a common timestamp column (typically TimeCreated for EVTX or datetime for super-timelines).

TIP

If you have triage collections from multiple hosts, merge each host's artifacts first into a per-host timeline, then merge the per-host timelines together. This two-stage merge keeps large investigations manageable and preserves the ability to filter by hostname.

2. Assess Evidence Coverage

Open the Log Source Coverage panel to review which artifact types and time ranges are represented. Look for:

  • Sysmon gaps -- if Sysmon was installed mid-incident, you may lack early process creation data
  • Security log overwrites -- high-volume environments may have lost older 4624/4625 events
  • Missing hosts -- compare your collected endpoints against the known scope of compromise

Document any coverage gaps now so your final report reflects what evidence was and was not available.

3. Identify the Initial Access Vector

Filter the merged timeline to the earliest suspicious timeframe. Common initial access artifacts include:

Event SourceEvent ID / ArtifactWhat It Shows
Security.evtx4624 (Type 10)Inbound RDP logon
Security.evtx4625Failed logon (brute force indicator)
Sysmon1Process creation from email attachment
Sysmon11File creation in \Downloads\ or \Temp\
Sysmon3Outbound network connection from Office process
PrefetchOUTLOOK.EXE, WINWORD.EXEOffice app execution preceding payload
MFTZone.Identifier ADSFiles downloaded from the internet

Use the Histogram at hour granularity to find the burst of activity around the initial compromise, then run Burst Analysis with a 1-minute window for precise timing. Tag the relevant rows with initial-access.

4. Trace the Execution Chain

Open the Process Inspector to visualize the execution flow from the initial payload. Suspicious patterns to look for:

  • Office to shell: WINWORD.EXE -> cmd.exe -> powershell.exe
  • Script interpreter chains: wscript.exe -> powershell.exe -> IEX(New-Object Net.WebClient).DownloadString(...)
  • LOLBin abuse: certutil.exe -urlcache -split -f http://..., bitsadmin.exe /transfer, mshta.exe http://...

Key Sysmon events for this phase:

Event IDDescriptionWhat to Look For
1Process CreateCommand line arguments, parent process, execution path
3Network ConnectionC2 callbacks from script interpreters
7Image LoadedUnsigned or anomalous DLLs loaded into legitimate processes
11File CreateDropped payloads in C:\Users\*\AppData\Local\Temp\
15File Stream CreateADS-based payload staging
25Process TamperingProcess hollowing or herpaderping

Tag execution artifacts with execution. Set up a Color Rule to highlight rows where the Image column contains known LOLBins (cmd.exe, powershell.exe, mshta.exe, certutil.exe, rundll32.exe).

5. Map Persistence Mechanisms

Search for persistence artifacts across the timeline. Common mechanisms in ransomware incidents:

Persistence TypeArtifact LocationEvent/Source
Scheduled TaskC:\Windows\System32\Tasks\*Security 4698, Sysmon 11
Run KeyHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunSysmon 13 (Registry Value Set)
Service CreationHKLM\SYSTEM\CurrentControlSet\Services\*System 7045, Security 4697
WMI Subscriptionroot\subscription namespaceSysmon 19, 20, 21
Startup FolderC:\Users\*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysmon 11, MFT
DLL Side-LoadingLegitimate application directory with malicious DLLSysmon 7 (Image Loaded)

Tag all confirmed persistence with persistence.

TIP

Stack the Image or TargetFilename column using the Stacking feature to quickly surface rare executables or files written to startup locations. Entries with a count of 1 across all endpoints deserve close inspection.

6. Identify Privilege Escalation

Look for the transition from standard user to elevated privileges:

IndicatorSourceDetails
Token ElevationSecurity 4672Special privileges assigned to new logon -- indicates admin-level access
Credential DumpingSysmon 10 (Process Access)Access to lsass.exe by unusual processes (e.g., rundll32.exe, unsigned binaries)
KerberoastingSecurity 4769TGS requests with RC4 encryption (0x17) for service accounts
DCSyncSecurity 4662Replication rights (DS-Replication-Get-Changes-All) exercised by non-DC account
Named Pipe ImpersonationSysmon 17, 18Pipe creation and connection by unexpected processes

Tag escalation evidence with priv-esc.

7. Track Lateral Movement

Filter for lateral movement indicators using the Lateral Movement Tracker. Cross-reference source and destination hosts:

TechniqueArtifacts
PsExecService install (System 7045) for PSEXESVC, named pipe \PIPE\psexesvc, Sysmon 1 for PSEXESVC.exe
WMIProcess creation via WmiPrvSE.exe parent (Sysmon 1), Security 4624 Type 3
RDPSecurity 4624 Type 10, TerminalServices-LocalSessionManager/Operational Event 21/22/25
SMB File CopySysmon 11 for files written via admin shares (C$, ADMIN$), Security 5140/5145
WinRM / PowerShell Remotingwsmprovhost.exe process creation (Sysmon 1), PowerShell/Operational Event 4103/4104

Tag with lateral-movement. Use the Histogram to observe the temporal pattern -- ransomware operators often move laterally in clusters, and the histogram will reveal these burst windows.

TIP

When analyzing lateral movement, open a second tab filtered to just 4624 events and sort by Logon Type. Type 3 (Network), Type 7 (Unlock), and Type 10 (RemoteInteractive) each tell a different story about how the attacker traversed the environment.

8. Detect Defense Evasion

Attackers routinely tamper with defenses before deploying ransomware. Search for:

Evasion TechniqueIndicator
Log clearingSecurity 1102, System 104
Defender disabledWindows Defender/Operational Event 5001 (Real-Time Protection disabled)
Defender exclusionsRegistry key HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths (Sysmon 13)
TimestompingMFT $SI vs $FN timestamp discrepancy
Process injectionSysmon 8 (CreateRemoteThread), Sysmon 10 (cross-process access)
AMSI bypassPowerShell/Operational 4104 containing AmsiUtils or amsiInitFailed

Tag with defense-evasion. Pay special attention to the gap between defense evasion and encryption -- this window often reveals the attacker's staging activity.

9. Find Data Exfiltration

Many ransomware groups exfiltrate data before encrypting. Look for:

  • Archive creation: Sysmon Event 1 process creation for 7z.exe, rar.exe, WinRAR.exe with command lines pointing to sensitive directories
  • Large outbound transfers: Sysmon Event 3 network connections to uncommon external IPs, SRUM data showing unusual BytesSent values
  • Cloud upload: Browser history entries for mega.nz, anonfiles.com, transfer.sh, or similar file-sharing services
  • Staging directories: MFT entries showing large archives created in C:\ProgramData\, C:\Temp\, or C:\Windows\Temp\

Run an IOC Matching sweep with known exfiltration infrastructure from your threat intelligence feed. Tag confirmed exfiltration with exfiltration.

10. Pinpoint the Encryption Event

The final phase is the ransomware deployment itself. Key indicators:

ArtifactWhat to Look For
Sysmon 1Ransomware binary execution -- note parent process, user context, and working directory
Sysmon 11Ransom notes (README.txt, DECRYPT_FILES.html, HOW_TO_RECOVER.txt) written to multiple directories
MFTMass file extension changes (.encrypted, .locked, .crypt) in a short time window
PrefetchRansomware executable prefetch file with high RunCount or recent LastRun timestamp
USN JournalFlood of DATA_OVERWRITE and RENAME entries
Security 4688Process creation for vssadmin.exe delete shadows /all /quiet or wmic shadowcopy delete
System 7036Volume Shadow Copy service stopped

Switch the Histogram to hour granularity to spot the general encryption window, then use Burst Analysis with a 1-minute window to pinpoint the characteristic spike -- a massive burst of file system events concentrated in a narrow time window. This spike marks the encryption start time.

Tag all encryption-phase artifacts with encryption.

TIP

Bookmark the exact timestamp of the first encrypted file and the last encrypted file. The duration of the encryption window is a critical data point for your incident report and helps estimate the scope of impact.

11. Build the Kill Chain Timeline

With all phases tagged, use the Search and Filtering panel to filter by tag. Walk through each phase in chronological order:

  1. initial-access -- When and how did the attacker gain entry?
  2. execution -- What was the first-stage payload?
  3. persistence -- How did they maintain access?
  4. priv-esc -- When did they escalate to admin or SYSTEM?
  5. lateral-movement -- Which hosts were compromised and in what order?
  6. defense-evasion -- What did they disable or tamper with?
  7. exfiltration -- Was data stolen, and how much?
  8. encryption -- When did ransomware deploy, and what was the blast radius?

Export the tagged and filtered timeline using Export Reports to produce a structured incident summary for stakeholders.


Key Event ID Reference

Event IDLog SourceDescription
1102SecurityAudit log cleared
4624SecuritySuccessful logon
4625SecurityFailed logon
4648SecurityExplicit credential logon
4662SecurityDirectory service access (DCSync)
4672SecuritySpecial privileges assigned
4688SecurityProcess creation (legacy)
4697SecurityService installed
4698SecurityScheduled task created
4769SecurityKerberos TGS request
5140SecurityNetwork share accessed
5145SecurityDetailed file share access
7045SystemNew service installed
104SystemEvent log cleared
1SysmonProcess creation
3SysmonNetwork connection
7SysmonImage loaded
8SysmonCreateRemoteThread
10SysmonProcess access
11SysmonFile create
13SysmonRegistry value set
17, 18SysmonPipe created / connected
25SysmonProcess tampering
4103, 4104PowerShell/OperationalScript block logging
1116Windows Defender/OperationalMalware detected
5001Windows Defender/OperationalReal-Time Protection state change

Next Steps

Built for the DFIR community.