Home >
Enterprise >
Participants >
GoSecure >
System Service Discovery (T1007)
|
|
Carbanak+FIN7 |
||
The technique was not in scope. |
APT29 |
||
The technique was not in scope. |
APT3 |
||||
Step | ATT&CK Pattern |
|
||
2.D.1
|
Tactic Discovery (TA0007) |
|
||
2.D.2
|
Tactic Discovery (TA0007) |
|
||
12.D.1
|
Tactic Discovery (TA0007) |
|
||
12.E.1.8
|
Tactic Discovery (TA0007) |
|
||
16.H.1
|
Tactic Discovery (TA0007) |
|
||
16.J.1
|
Tactic Discovery (TA0007) |
|
||
17.A.1.1
|
Tactic Discovery (TA0007) |
|
Procedure
Empire: WinEnum module included enumeration of services
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.
Procedure
Empire: 'sc query' via PowerShell to remotely enumerate services on Creeper (10.0.0.4)
Footnotes
- The capability was modified after the start of the evaluation to allow the condition contributing to Enrichment to appear, so the detection is identified as a configuration change. See Configuration page for details.


Procedure
Empire: 'sc qc' via PowerShell to remotely enumerate a specific service on Creeper (10.0.0.4)
Footnotes
- The capability was modified after the start of the evaluation to allow the condition contributing to Enrichment to appear, so the detection is identified as a configuration change. See Configuration page for details.


Procedure
Empire: 'reg query' via PowerShell to enumerate a specific Registry key associated with terminal services
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.

