Home >
Enterprise >
Participants >
GoSecure >
System Information Discovery (T1082)
|
|
Carbanak+FIN7 |
||||
Step | ATT&CK Pattern |
|
||
2.A.2
|
Tactic Discovery (TA0007) |
|
||
12.A.5
|
Tactic Discovery (TA0007) |
|
||
13.A.6
|
Tactic Discovery (TA0007) |
|
||
13.A.9
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
4.C.3
|
Tactic Discovery (TA0007) |
|
||
4.C.6
|
Tactic Discovery (TA0007) |
|
||
11.A.4
|
Tactic Discovery (TA0007) |
|
||
13.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated computer manufacturer, model, and version information using PowerShell
Criteria
powershell.exe executing a Get-WmiObject gwmi queries for Win32_BIOS and Win32_ComputerSystem
APT3 |
||||
Step | ATT&CK Pattern |
|
||
2.E.1
|
Tactic Discovery (TA0007) |
|
||
2.E.2
|
Tactic Discovery (TA0007) |
|
||
12.E.1.6.1
|
Tactic Discovery (TA0007) |
|
||
12.E.1.6.2
|
Tactic Discovery (TA0007) |
|
Procedure
Empire: WinEnum module included enumeration of system information
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.