Home >
Enterprise >
Participants >
Bitdefender >
System Owner/User Discovery (T1033)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
7.B.1
|
Tactic Discovery (TA0007) |
|
||||
13.A.5
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
4.C.2
|
Tactic Discovery (TA0007) |
|
||||
11.A.6
|
Tactic Discovery (TA0007) |
|
||||
13.C.1
|
Tactic Discovery (TA0007) |
|
||||
15.A.1
|
Tactic Discovery (TA0007) |
|
||||
16.B.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated the current username using PowerShell
Criteria
powershell.exe executing $env:USERNAME
Procedure
Checked that the username is not related to admin or a generic value (ex: user) using PowerShell
Criteria
powershell.exe executing a Get-WmiObject query for Win32_ComputerSystem
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
Procedure
Enumerated the current username using the GetUserNameEx API
Criteria
powershell.exe executing the GetUserNameEx API
Procedure
Enumerated logged on users using PowerShell
Criteria
powershell.exe executing $env:UserName
Procedure
Enumerated the domain SID (from current user SID) using the ConvertSidToStringSid API
Criteria
powershell.exe executing the ConvertSidToStringSid API
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.

