TL;DR
This guide outlines a step-by-step methodology for assessing malware threats. It covers identification, containment, eradication and recovery phases, with practical advice for both technical users and those needing to understand the process.
1. Preparation & Initial Assessment
- Define Scope: What systems are potentially affected? Is it a single computer, a network segment, or the entire organisation?
- Gather Information: Collect any initial reports of unusual behaviour – slow performance, error messages, unexpected pop-ups. Ask users what they were doing when problems started.
- Initial Triage (Non-Technical): Look for obvious signs:
- Unexpected software installed.
- Changes to browser homepage or search engine.
- Unusual network activity (if visible – e.g., a lot of downloads).
2. Identification & Analysis
- Isolate the System: Disconnect the affected machine(s) from the network to prevent further spread. This is *crucial*.
- Run a Full Scan with Anti-Virus Software: Use your existing anti-virus solution first. Ensure it’s up-to-date before scanning.
# Example using Windows Defender (command line)MpCmdRun.exe -Scan -ScanType 3 -File C: - Second Opinion Scanner: Download and run a reputable second opinion scanner (e.g., Malwarebytes, HitmanPro). These often catch things your primary anti-virus misses.
- Download from the official website only!
- Run in safe mode for best results.
- Process Analysis (Technical): Use tools like Process Explorer to identify suspicious processes:
- Look for processes with unusual names or locations.
- Check CPU and memory usage – high usage by an unknown process is a red flag.
- Examine the parent process of any suspect programs.
- File Analysis (Technical): Use VirusTotal to scan suspicious files online:
https://www.virustotal.com/gui/file/YOUR_FILE_HASHReplace
YOUR_FILE_HASHwith the SHA256 hash of the file.
3. Containment
- Confirm Scope: Based on analysis, determine all affected systems.
- Network Segmentation: If possible, isolate affected network segments to limit spread.
- Account Lockdown: Reset passwords for any accounts potentially compromised on infected machines.
4. Eradication
- Remove Malware: Use anti-virus and second opinion scanners to remove identified malware.
- Quarantine detected files before deleting them.
- If a program refuses to be removed, consider booting from a rescue disk (see Recovery section).
- Clean Temporary Files: Delete temporary files and browser caches.
- Remove Suspicious Scheduled Tasks: Check the Task Scheduler for any unusual tasks that might be re-infecting the system.
5. Recovery
- Restore from Backup (Recommended): If available, restore affected systems from a clean backup taken *before* the infection.
- Verify the integrity of the backup before restoring.
- Re-image System: For severely infected systems or if backups are unavailable, re-imaging the system is often the fastest and most reliable solution.
- Boot from Rescue Disk (Technical): Use a bootable rescue disk containing anti-virus tools to scan and clean the system before booting into Windows.
- Kaspersky Rescue Disk, Bitdefender Rescue CD are good options.
6. Post-Incident Activity
- Review Logs: Analyse system logs and network traffic for any further evidence of the infection.
- Update Security Measures: Patch vulnerabilities, strengthen passwords, review firewall rules, and improve cyber security awareness training.
- Incident Reporting: Document the incident thoroughly, including timelines, affected systems, malware identified, and actions taken. Consider reporting to relevant authorities if required (e.g., ICO in the UK).

