Home >
Enterprise >
Participants >
Cybereason >
System Owner/User Discovery (T1033)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
7.B.1
|
Tactic Discovery (TA0007) |
|
||||
13.A.5
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
4.C.2
|
Tactic Discovery (TA0007) |
|
||
11.A.6
|
Tactic Discovery (TA0007) |
|
||
13.C.1
|
Tactic Discovery (TA0007) |
|
||
15.A.1
|
Tactic Discovery (TA0007) |
|
||
16.B.1
|
Tactic Discovery (TA0007) |
|
Procedure
Checked that the username is not related to admin or a generic value (ex: user) using PowerShell
Criteria
powershell.exe executing a Get-WmiObject query for Win32_ComputerSystem
Procedure
Enumerated logged on users using PowerShell
Criteria
powershell.exe executing $env:UserName
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
2.B.1
|
Tactic Discovery (TA0007) |
|
||||
12.B.1
|
Tactic Discovery (TA0007) |
|
||||
12.E.1.1
|
Tactic Discovery (TA0007) |
|
||||
20.B.1
|
Tactic Discovery (TA0007) |
|
Procedure
Empire: 'whoami -all -fo list' via PowerShell
Footnotes
- The telemetry behind each enrichment is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


Procedure
Executed 'whoami' via cmd persistence mechanism through RDP connection made to Creeper (10.0.0.4)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.

