APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
A Technique alert detection (info severity) called "WMI Queries Win32_Bios" was generated for a PowerShell gwmi query for Win32_BIOS.
[1]
[2]
[3]
[4]
|
|
Telemetry showed the PowerShell gwmi query for Win32_BIOS.
[1]
[2]
|
|
An MSSP detection for "Discovery - Virtualization/Sandbox Evasion" occurred for the PowerShell gwmi query for Win32_BIOS.
[1]
[2]
[3]
|
|
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_BIOS
[1]
[2]
[3]
[4]
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_BIOS
[1]
[2]
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_BIOS
[1]
[2]
[3]