Home >
Enterprise >
Participants >
Cybereason >
System Network Configuration Discovery (T1016)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
12.A.4
|
Tactic Discovery (TA0007) |
|
||||
13.A.8
|
Tactic Discovery (TA0007) |
|
||||
15.A.7
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
4.C.4
|
Tactic Discovery (TA0007) |
|
||
11.A.7
|
Tactic Discovery (TA0007) |
|
||
13.B.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated the current domain name using PowerShell
Criteria
powershell.exe executing $env:USERDOMAIN
Procedure
Checked that the computer is joined to a domain using PowerShell
Criteria
powershell.exe executing a Get-WmiObject query for Win32_ComputerSystem
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
2.A.1
|
Tactic Discovery (TA0007) |
|
||||
2.A.2
|
Tactic Discovery (TA0007) |
|
||||
4.B.1
|
Tactic Discovery (TA0007) |
|
||||
12.A.1
|
Tactic Discovery (TA0007) |
|
||||
12.A.2
|
Tactic Discovery (TA0007) |
|
||||
12.E.1.11
|
Tactic Discovery (TA0007) |
|
Procedure
Cobalt Strike: 'netsh advfirewall show allprofiles' via cmd
Footnotes
- The telemetry behind each enrichment is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


Procedure
Empire: 'ipconfig -all' via PowerShell
Footnotes
- The telemetry behind each enrichment is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.

