Home >
Enterprise >
Participants >
Bitdefender >
System Information Discovery (T1082)
|
|
Carbanak+FIN7 |
||||||||
Step | ATT&CK Pattern |
|
||||||
2.A.2
|
Tactic Discovery (TA0007) |
|
||||||
12.A.5
|
Tactic Discovery (TA0007) |
|
||||||
13.A.6
|
Tactic Discovery (TA0007) |
|
||||||
13.A.9
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
4.C.3
|
Tactic Discovery (TA0007) |
|
||||||
4.C.6
|
Tactic Discovery (TA0007) |
|
||||||
11.A.4
|
Tactic Discovery (TA0007) |
|
||||||
13.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated the computer hostname using PowerShell
Criteria
powershell.exe executing $env:COMPUTERNAME
Procedure
Enumerated the OS version using PowerShell
Criteria
powershell.exe executing Gwmi Win32_OperatingSystem
Procedure
Enumerated computer manufacturer, model, and version information using PowerShell
Criteria
powershell.exe executing a Get-WmiObject gwmi queries for Win32_BIOS and Win32_ComputerSystem
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
Procedure
Enumerated computer manufacturer, model, and version information using PowerShell
Criteria
powershell.exe executing a Get-WmiObject gwmi queries for Win32_BIOS and Win32_ComputerSystem
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.

