Home >
Enterprise >
Participants >
ReaQta >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.1
|
Tactic Discovery (TA0007) |
|
||||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
2.A.1
|
Tactic Discovery (TA0007) |
|
||
4.C.1
|
Tactic Discovery (TA0007) |
|
||
9.B.2
|
Tactic Discovery (TA0007) |
|
||
11.A.9
|
Tactic Discovery (TA0007) |
|
||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Checked that the payload is not inside a folder path that contains "sample" or is the length of a hash value using PowerShell
Criteria
powershell.exe executing (Get-Item -Path ".\" -Verbose).FullName
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Enumerated the System32 directory using PowerShell
Criteria
powershell.exe executing (gci ((gci env:windir).Value + '\system32')
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


[2]

