<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Finding USB and Removable Media Detection in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Finding-USB-and-Removable-Media-Detection/m-p/273918#M176764</link>
    <description>&lt;P&gt;I've recently had some Ransomware  that I think came off of a users USB drive. I am worried he might have shared it with other people but he can't remember the name of the USB drive and now he lost it :-/.  I found a search on &lt;A href="http://gosplunk.com/"&gt;http://gosplunk.com/&lt;/A&gt; (see below) that I thought would work, but it doesn't find it for his Windows 10 machine. Anyone have any ideas?  I am collecting most windows logs AND WinRegistry&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=WinRegistry key_path="HKLM\\system\\controlset*\\enum\\usbstor\\*" &amp;nbsp;registry_type=CreateKey | eval Date=strftime(_time, "%Y/%m/%d %H:%M:%S") | rex "key_path.*usbstor\S(?&amp;lt;DeviceType&amp;gt;.*)&amp;amp;ven\S(?&amp;lt;Vendor&amp;gt;.*)&amp;amp;prod\S(?&amp;lt;Product&amp;gt;\S*)&amp;amp;rev\S" &amp;nbsp;&amp;nbsp;| stats &amp;nbsp;count by Date, host, Vendor, Product, DeviceType &amp;nbsp;&amp;nbsp;| fields &amp;nbsp;- count &amp;nbsp;&amp;nbsp;| sort &amp;nbsp;- Date
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Sun, 11 Sep 2016 22:49:23 GMT</pubDate>
    <dc:creator>alice_waynecorp</dc:creator>
    <dc:date>2016-09-11T22:49:23Z</dc:date>
    <item>
      <title>Finding USB and Removable Media Detection</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Finding-USB-and-Removable-Media-Detection/m-p/273918#M176764</link>
      <description>&lt;P&gt;I've recently had some Ransomware  that I think came off of a users USB drive. I am worried he might have shared it with other people but he can't remember the name of the USB drive and now he lost it :-/.  I found a search on &lt;A href="http://gosplunk.com/"&gt;http://gosplunk.com/&lt;/A&gt; (see below) that I thought would work, but it doesn't find it for his Windows 10 machine. Anyone have any ideas?  I am collecting most windows logs AND WinRegistry&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=WinRegistry key_path="HKLM\\system\\controlset*\\enum\\usbstor\\*" &amp;nbsp;registry_type=CreateKey | eval Date=strftime(_time, "%Y/%m/%d %H:%M:%S") | rex "key_path.*usbstor\S(?&amp;lt;DeviceType&amp;gt;.*)&amp;amp;ven\S(?&amp;lt;Vendor&amp;gt;.*)&amp;amp;prod\S(?&amp;lt;Product&amp;gt;\S*)&amp;amp;rev\S" &amp;nbsp;&amp;nbsp;| stats &amp;nbsp;count by Date, host, Vendor, Product, DeviceType &amp;nbsp;&amp;nbsp;| fields &amp;nbsp;- count &amp;nbsp;&amp;nbsp;| sort &amp;nbsp;- Date
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 11 Sep 2016 22:49:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Finding-USB-and-Removable-Media-Detection/m-p/273918#M176764</guid>
      <dc:creator>alice_waynecorp</dc:creator>
      <dc:date>2016-09-11T22:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Finding USB and Removable Media Detection</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Finding-USB-and-Removable-Media-Detection/m-p/273919#M176765</link>
      <description>&lt;P&gt;Hey Alice, I ran into the same problem before. The issue seems to be that Windows puts its USB insertion information in 17 different registry keys [1], so you can  actually need to look multiple places. The search below is kind of a sledge hammer, but the "data" field I list out below tends to show the actual "USB" device name&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"sourcetype=WinRegistry  "HKLM\\SOFTWARE\\Microsoft\\WindowsNT\\CurrentVersion\\EMDMgmt\\" OR "HKLM\\SOFTWARE\\Microsoft\\Windows Portable Devices\\Devices\\" OR "HKLM\\SYSTEM\\ControlSet001\\Control\\DeviceClasses\\" OR "HKLM\\SYSTEM\\ControlSet001\\Enum\\STORAGE\\Volume\\" OR "HKLM\\SYSTEM\\ControlSet001\\Enum\\USB\\VID_111D&amp;amp;PID_0000\\" OR "HKLM\\SYSTEM\\ControlSet001\\Enum\\USBSTOR\\" OR "HKLM\\SYSTEM\\ControlSet001\\Enum\\WpdBusEnumRoot\\UMB\\" OR "HKLM\\SYSTEM\\ControlSet002\\Control\\DeviceClasses\\" OR "HKLM\\SYSTEM\\ControlSet002\\Enum\\STORAGE\\Volume\\" OR "HKLM\\SYSTEM\\ControlSet002\\Enum\\USB\\VID_111D&amp;amp;PID_0000" OR "HKLM\\SYSTEM\\ControlSet002\\Enum\\USBSTOR\\" OR "HKLM\\SYSTEM\\ControlSet002\\Enum\\WpdBusEnumRoot\\UMB\\" OR "HKLM\\SYSTEM\\CurrentControlSet\\Control\\DeviceClasses\\" OR "HKLM\\SYSTEM\\CurrentControlSet\\Enum\\STORAGE\\Volume\\" OR "HKLM\\SYSTEM\\CurrentControlSet\\Enum\\USB\\VID_111D&amp;amp;PID_0000\\" OR "HKLM\\SYSTEM\\CurrentControlSet\\Enum\\USBSTOR\\" OR "HKLM\\SYSTEM\\ CurrentControlSet\\Enum\\WpdBusEnumRoot\\UMB" | stats count by data"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;[1] &lt;A href="http://www.forensicmag.com/article/2012/08/windows-7-registry-forensics-part-6"&gt;http://www.forensicmag.com/article/2012/08/windows-7-registry-forensics-part-6&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 15:48:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Finding-USB-and-Removable-Media-Detection/m-p/273919#M176765</guid>
      <dc:creator>rkovar_splunk</dc:creator>
      <dc:date>2016-09-12T15:48:39Z</dc:date>
    </item>
  </channel>
</rss>

