Home >
Enterprise >
Participants >
Trend Micro >
Process Discovery (T1057)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
2.A.4
|
Tactic Discovery (TA0007) |
|
||||
5.B.3
![]() |
Tactic Discovery (TA0007) |
|
||||
13.A.1
|
Tactic Discovery (TA0007) |
|
||||
15.A.1
|
Tactic Discovery (TA0007) |
|
||||
20.B.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
4.B.1
|
Tactic Discovery (TA0007) |
|
||||||
4.C.5
|
Tactic Discovery (TA0007) |
|
||||||
8.A.3
|
Tactic Discovery (TA0007) |
|
||||||
11.A.8
|
Tactic Discovery (TA0007) |
|
||||||
13.D.1
|
Tactic Discovery (TA0007) |
|
||||||
14.B.2
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated running processes using the CreateToolhelp32Snapshot API
Criteria
powershell.exe executing the CreateToolhelp32Snapshot API
Footnotes
- The script containing the variables in scope was manually recovered from the system by the analyst, so it is identified as Host Interrogation.

