Home >
Enterprise >
Participants >
Bitdefender >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.1
|
Tactic Discovery (TA0007) |
|
||||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
2.A.1
|
Tactic Discovery (TA0007) |
|
||||
4.C.1
|
Tactic Discovery (TA0007) |
|
||||
9.B.2
|
Tactic Discovery (TA0007) |
|
||||
11.A.9
|
Tactic Discovery (TA0007) |
|
||||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated user's temporary directory path using PowerShell
Criteria
powershell.exe executing $env:TEMP
Procedure
Searched filesystem for document and media files using PowerShell
Criteria
powershell.exe executing (Get-)ChildItem
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
Procedure
Checked that the payload is not inside a folder path that contains "sample" or is the length of a hash value using PowerShell
Criteria
powershell.exe executing (Get-Item -Path ".\" -Verbose).FullName
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Enumerated the System32 directory using PowerShell
Criteria
powershell.exe executing (gci ((gci env:windir).Value + '\system32')
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


[2]

