Tier 2 · SOP-006 · Module 06 of 09

Malware Detection & Removal

Identify malware infection signs, execute safe removal procedures, and prevent reinfection. This is where Tier 2 begins — security knowledge that separates you from Level 1.

Tier 2 — IT Support SOP-006 Intermediate Security
🛡️

Phase 1 — Learn IT

Understand malware types, infection vectors, and behavioral indicators before you touch a single scan tool.

Malware Types You'll Encounter

Malware is any software designed to damage, disrupt, or gain unauthorized access to systems. At Tier 2, you need to identify malware types quickly because removal approach varies by type. A ransomware incident requires immediate isolation. A browser hijacker just needs an adware cleaner. Treating them the same wastes time and can make things worse.

TypeBehaviorCommon VectorSeverity
VirusAttaches to legitimate files; spreads when file is sharedInfected USB, email attachmentMedium
WormSelf-replicates across network without user actionNetwork vulnerabilitiesHigh
TrojanDisguises as legitimate software; installs backdoorFake downloads, pirated softwareHigh
RansomwareEncrypts files and demands paymentPhishing email, RDP exploitCritical
SpywareMonitors keystrokes, screenshots, data silentlyBundled software, phishing sitesHigh
AdwareInjects ads, hijacks browser searchesFree software bundles, fake updatesLow-Medium
RootkitHides deeply in OS, masks other malwareTrojan droppers, exploit kitsCritical
KeyloggerRecords all keystrokes including passwordsPhishing, RAT softwareHigh

Behavioral Indicators of Compromise

Users rarely know what malware looks like — they just know something feels wrong. Your job is to translate vague complaints into specific malware indicators.

User ComplaintPossible Malware Indicator
"My computer is really slow all of a sudden"Cryptominer, worm, or heavy adware consuming CPU/memory
"I'm getting tons of popups even when I'm not on a browser"Adware or trojan with ad injection
"My homepage changed and searches go to a weird site"Browser hijacker / PUP (Potentially Unwanted Program)
"My files have weird extensions and I can't open them"Ransomware — isolate immediately
"My antivirus turned itself off"Trojan or rootkit designed to disable security software
"I'm seeing login prompts for accounts I didn't open"Spyware or credential theft malware
"Random processes are using a lot of CPU in Task Manager"Cryptominer or worm activity
⚠️

Ransomware: Isolate First, Scan Second

If a user reports files with strange extensions (.locked, .encrypted, .WNCRY) or a ransom demand screen, disconnect the machine from the network immediately — pull the Ethernet cable or disable Wi-Fi. Do NOT run a scan first. Ransomware can spread across mapped network drives and shared folders before a scan completes. Isolation stops the spread. Then escalate to security team before attempting removal.

How Malware Gets In

  • Phishing emails — malicious links or attachments disguised as legitimate messages. Still the #1 vector.
  • Drive-by downloads — visiting compromised or malicious sites that silently download and execute code.
  • Software bundling — free software that installs adware or PUPs alongside the main application.
  • Infected USB drives — autorun malware or dropped executables from shared removable media.
  • Unpatched vulnerabilities — exploits targeting known OS or application security holes not yet patched.
  • RDP brute force — exposed Remote Desktop endpoints attacked with credential lists. Common ransomware vector.

Key Terms

IOC
Indicator of Compromise. Observable evidence that a system may have been breached — unusual processes, unexpected network connections, modified files.
PUP
Potentially Unwanted Program. Software bundled with legitimate apps that modifies browser settings or shows ads. Technically not malware but unwanted.
Quarantine
Isolating a detected threat in a sandbox environment so it cannot execute or spread, pending review or deletion.
Safe Mode
Windows boot mode that loads only essential drivers and services. Many malware programs cannot run in Safe Mode, making removal easier.
Persistence
How malware survives reboots — registry run keys, scheduled tasks, startup folder, or service installations. Must be removed or malware returns.
📋

Phase 2 — Do IT

Execute SOP-006. Safety and isolation first, scanning second, verification always.

SOP-006 · MALWARE DETECTION & REMOVAL · REV 1.0

Malware Detection, Removal & Post-Incident Verification

Use this procedure when a user reports suspected malware, or when antivirus flags a threat. Isolation and documentation are as important as the scan itself. Never skip the verification step.

01

Assess and Isolate If Ransomware Suspected

Ask the user: Are files inaccessible with strange extensions? Is there a ransom note on screen? If yes — disconnect network immediately (pull cable or disable adapter). Document the time of isolation. Do NOT proceed with scanning — escalate to the security team now. For all other malware types, proceed to step 2.

02

Document Symptoms Before Making Changes

Note all symptoms, when they started, and what the user did recently (installed software, clicked a link, plugged in a USB). Take screenshots of any error messages, unusual processes in Task Manager, or browser changes. This documentation is critical for post-incident analysis and any security reporting.

03

Boot Into Safe Mode with Networking

Restart and boot into Safe Mode with Networking (hold Shift → Restart → Troubleshoot → Advanced Options → Startup Settings → F5). This prevents most malware from loading while allowing you to download scanner updates and definitions. Many threats cannot run in Safe Mode.

04

Run Windows Defender Full Scan

Open Windows Security → Virus & threat protection → Scan options → Full scan. Let it complete fully — do not interrupt. Quarantine or remove all detected threats. Note all threat names detected for documentation. If Defender was disabled by malware, this may need to be re-enabled first via Settings or Group Policy.

05

Run Malwarebytes as Secondary Scanner

Download and run Malwarebytes Free as a second-opinion scanner — it catches different threat signatures than Defender. Run a full scan. Quarantine and remove all threats found. Using two scanners significantly increases detection coverage because no single scanner catches everything.

06

Check for Persistence Mechanisms

Open Task Manager → Startup tab and disable any unfamiliar startup entries. Open msconfigServices tab → check "Hide all Microsoft services" → look for unknown services. Check Registry Editor at HKCU\Software\Microsoft\Windows\CurrentVersion\Run for suspicious entries. Also check C:\Users\[user]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup.

07

Reset Browser Settings If Affected

For browser hijacking: In Chrome go to Settings → Reset and clean up → Restore settings to their original defaults. In Edge: Settings → Reset settings. Uninstall any suspicious browser extensions. Change the homepage and default search engine back to intended values. Clear browsing data including cookies and cached content.

08

Verify, Update, and Prevent Reinfection

Reboot normally (not Safe Mode) and confirm symptoms are resolved. Run Windows Update to apply any outstanding patches. Ensure Windows Defender real-time protection is enabled and up to date. Educate the user briefly on the infection vector (phishing, bad download) so they can recognize it in the future. Document the full incident in the ticket.

Escalate to Security Team When

  • Ransomware confirmed — files encrypted or ransom demand visible
  • Malware returns after full removal (likely rootkit or persistence not found)
  • Sensitive data may have been exfiltrated (keylogger, spyware)
  • Multiple machines on the same network appear infected (possible worm spread)
  • Malware disabled security software and you cannot re-enable it
  • System is critical and wipe-and-rebuild may be required

Malware Response Cheat Sheet

ScenarioFirst Action
Ransomware suspectedDisconnect network → escalate to security team
Popups / browser hijackSafe Mode → Defender scan → Malwarebytes → browser reset
Slow PC, high CPUTask Manager → identify process → run full scan
Antivirus disabledRe-enable via Settings → scan → check persistence
Malware keeps returningEscalate — likely rootkit or undetected persistence
🎯

Phase 3 — Apply IT

Handle real malware scenarios with correct priority and procedure. Documentation is non-negotiable.

Practice Tickets

SCENARIO 01

The Browser Hijack

"Every time I open Chrome, it goes to some search engine called 'SearchNow' instead of Google. I'm also getting random popups about virus warnings telling me to call a phone number."
Your Tasks
  • 1.What type of malware is this most likely? Is it critical severity?
  • 2.What is the "call a phone number" popup and how do you advise the user about it?
  • 3.Walk through the scan procedure in order.
  • 4.After scans are clean, what browser-specific steps do you take?
SCENARIO 02

Ransomware Alert

"I can't open any of my files. They all have .LOCKED at the end. There's a text file on my desktop saying to pay Bitcoin to get my files back. I work in accounting."
Your Tasks
  • 1.What is your immediate first action — before anything else?
  • 2.Why is this a critical concern given that the user is in accounting?
  • 3.Should you run a malware scan right now? Why or why not?
  • 4.Who do you escalate to and what information do you provide them immediately?
SCENARIO 03

The Persistent Threat

"We removed what Malwarebytes found yesterday. But today the same malware is back again. This is the third time this week."
Your Tasks
  • 1.What does recurring infection after removal indicate?
  • 2.What two locations would you check for persistence mechanisms?
  • 3.If persistence is not found, what is the likely explanation and the correct resolution?
  • 4.At what point do you recommend a full wipe and rebuild instead of continued removal attempts?

Document Your Resolution

FieldYour Entry
Malware Type
Infection Vector
Threats Detected
Steps Taken
Resolution
Prevention Advice

Questions You'll Face

Interview Question 01

"A user reports that their files have changed extensions and there's a message on screen demanding payment. What do you do first?"

Strong Answer Framework

The first thing I do is disconnect the machine from the network immediately — pull the Ethernet cable or disable the Wi-Fi adapter. This is critical because ransomware actively encrypts files and can spread to mapped network drives and shared folders. Running a scan first would allow it to continue encrypting. After isolation, I document the time, the user's name, machine name, and any visible details from the ransom screen, and escalate to the security team before touching anything else. The decision to pay, restore from backup, or attempt decryption is a security and management decision — not a Tier 2 call.

Interview Question 02

"What tools do you use for malware removal and why do you use more than one?"

Strong Answer Framework

I use Windows Defender as the primary scanner — it's built-in, updated regularly, and has good general coverage. Then I use Malwarebytes as a second-opinion scanner because different tools use different signature databases and heuristic engines. No single scanner catches 100% of threats. Malwarebytes is particularly good at adware, PUPs, and newer threats that traditional AV may miss. Using both significantly increases detection coverage. I also check for persistence mechanisms manually — startup entries, scheduled tasks, and registry run keys — because scanners sometimes clean the active threat but miss the dropper that reinstalls it.

Interview Question 03

"What is the difference between a virus and a worm?"

Strong Answer Framework

A virus requires a host file and human action to spread — it attaches itself to a legitimate file, and spreads when that file is executed or shared (via email, USB, etc.). A worm is self-replicating and spreads autonomously through network vulnerabilities without needing a user to do anything. This distinction matters for response: a virus on one machine needs that machine cleaned; a worm may already have spread to other machines on the network before you're even called. Worm infections often require checking other network-connected devices and involving the network team.

Completion Checklist

I can identify the 8 major malware types and explain what makes each dangerous
I know to isolate immediately for ransomware before running any scan
I can execute a dual-scan procedure (Defender + Malwarebytes) in Safe Mode
I can check startup entries, services, and registry run keys for persistence
I know when to escalate vs. continue removal attempts
I completed all three scenarios and documented at least one full incident ticket

Continue Your Training

Module 06 · SOP-006
Finished all three phases? Mark this module complete.