Home >
Enterprise >
Participants >
Kaspersky >
Process Discovery (T1057)
|
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
4.B.1
|
Tactic Discovery (TA0007) |
|
||
4.C.5
|
Tactic Discovery (TA0007) |
|
||
8.A.3
|
Tactic Discovery (TA0007) |
|
||
11.A.8
|
Tactic Discovery (TA0007) |
|
||
13.D.1
|
Tactic Discovery (TA0007) |
|
||
14.B.2
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated current running processes using PowerShell
Criteria
powershell.exe executing Get-Process
Procedure
Enumerated processes on remote host Scranton (10.0.1.4) using PowerShell
Criteria
powershell.exe executing Get-Process