Investigate processes

Processes are one of the Entity types investigated by Hunters as part of its Lead creation and auto-investigtion stages.

Processes in the lead

In many cyber incidents, identifying the origin and behavior of processes is critical for determining the root cause and extent of an attack. SOC analysts can use Hunters to gain a comprehensive and intuitive view of process relationships during security investigations by exploring the Hunters Process Tree.

Process Tree enables analysts to trace the lifecycle of processes in an alert and to explore their interactions within the operating system. By giving analysts a clear view of parent-child relationships and associated activities like network connections or file manipulations, this feature helps streamline the investigation process and reduces the time it takes to respond to security threats.

View and explore process progression

Process Tree preview

You can view a concentrated overview of the process you are exploring in the Lead details page by opening the lead and navigating to the process entity tab.

Process tree overview in the lead

Full Process Tree

To explore further, click Full Process Tree to open a more extensive view providing you with a complete suite of information regarding the process. This includes detailed parent-child relationships that show how processes evolved over time, offering crucial insight into how malicious processes may have originated or propagated.

The Process Tree enables you to move up and down the process chain effortlessly by navigating to the parent process to identify the origin or potential cause of the current process or by drilling down into child processes by clicking the plus (+) sign to understand how a malicious action might have spawned additional threats.

Process tree drilldown(1)

You can zoom in and out as needed or drag the process canvas to allow you to navigate within complex trees.

💡Tip

To keep track during your investigation, look for the Entry point tag which marks the place you entered the Process Tree, meaning the process you initially investigated.

Investigating process details and events

Investigate process details

You can investigate a process further by selecting it from the process tree and examining the Process details panel, on the right side of the screen.

The Process details panel displays the time in which the Process event occurred, a link to related events (which will appear on the lower part of the screen), and the process Attributes.

Show process events

You can dive into specific events and actions associated with a process, by selecting the process from the tree and examining the lower part of the screen.

These events include:

  • Network Connections: Connections initiated by the process, used to identify potential command-and-control or data exfiltration activity.

  • File System Activity: System files created, deleted, or modified by the process, offering critical insight into potential data tampering or ransomware actions.

  • Process Activity: Details of the processes related to the selected process.