Home >
Enterprise >
Participants >
CyCraft >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.1
|
Tactic Discovery (TA0007) |
|
||||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
2.A.1
|
Tactic Discovery (TA0007) |
|
||||
4.C.1
|
Tactic Discovery (TA0007) |
|
||||
9.B.2
|
Tactic Discovery (TA0007) |
|
||||
11.A.9
|
Tactic Discovery (TA0007) |
|
||||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated user's temporary directory path using PowerShell
Criteria
powershell.exe executing $env:TEMP
Footnotes
- MSSP analysis that was performed on Windows Event Logs (Event ID 4104, PowerShell ScriptBlock Logs) would have been requested during a normal engagement when CyCraft MDR received insufficient information for analysis of adversary activity.

