Home >
Enterprise >
Participants >
Cybereason >
Account Discovery (T1087)
|
|
See technique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
6.A.3
|
|
APT29 |
||
The technique was not in scope. |
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
2.G.1
|
|
|||||
2.G.2
|
|
|||||
7.A.1.3
|
|
|||||
12.G.1
|
|
|||||
12.G.2
|
|
Procedure
Empire: 'net user' via PowerShell
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


Procedure
Empire: 'net user -domain' via PowerShell
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]

