Home >
Enterprise >
Participants >
GoSecure >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||
Step | ATT&CK Pattern |
|
||
4.A.1
|
Tactic Discovery (TA0007) |
|
||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
2.A.1
|
Tactic Discovery (TA0007) |
|
||
4.C.1
|
Tactic Discovery (TA0007) |
|
||
9.B.2
|
Tactic Discovery (TA0007) |
|
||
11.A.9
|
Tactic Discovery (TA0007) |
|
||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Searched filesystem for document and media files using PowerShell
Criteria
powershell.exe executing (Get-)ChildItem
Procedure
Checked that the payload is not inside a folder path that contains "sample" or is the length of a hash value using PowerShell
Criteria
powershell.exe executing (Get-Item -Path ".\" -Verbose).FullName
APT3 |
||||
Step | ATT&CK Pattern |
|
||
8.A.1
|
Tactic Discovery (TA0007) |
|
||
8.A.2
|
Tactic Discovery (TA0007) |
|
||
9.A.1
|
Tactic Discovery (TA0007) |
|
||
12.E.1.4.1
|
Tactic Discovery (TA0007) |
|
||
12.E.1.4.2
|
Tactic Discovery (TA0007) |
|
||
16.K.1
|
Tactic Discovery (TA0007) |
|
||
18.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Cobalt Strike: 'ls' (List) via Win32 APIs to enumerate a network shared drive (Wormshare) on Conficker (10.0.0.5)
Procedure
Empire: WinEnum module included enumeration of recently opened files
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.
Procedure
Empire: WinEnum module included enumeration of interesting files
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.
Procedure
Empire: 'type' via PowerShell to remotely enumerate a specific file (update.vbs) on Creeper (10.0.0.4)
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.
Procedure
Empire: 'Get-ChildItem' via PowerShell to enumerate a network shared drive (Wormshare) on Conficker (10.0.0.5)
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.