Home >
Enterprise >
Participants >
Malwarebytes >
File and Directory Discovery (T1083)
|
|
Carbanak+FIN7 |
||||
Step | ATT&CK Pattern |
|
||
4.A.1
|
Tactic Discovery (TA0007) |
|
||
5.B.4
![]() |
Tactic Discovery (TA0007) |
|
||
7.C.2
|
Tactic Discovery (TA0007) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
2.A.1
|
Tactic Discovery (TA0007) |
|
||
4.C.1
|
Tactic Discovery (TA0007) |
|
||
9.B.2
|
Tactic Discovery (TA0007) |
|
||
11.A.9
|
Tactic Discovery (TA0007) |
|
||
12.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Searched filesystem for document and media files using PowerShell
Criteria
powershell.exe executing (Get-)ChildItem
Procedure
Enumerated user's temporary directory path using PowerShell
Criteria
powershell.exe executing $env:TEMP
Procedure
Searched filesystem for document and media files using PowerShell
Criteria
powershell.exe executing (Get-)ChildItem
Procedure
Checked that the payload is not inside a folder path that contains "sample" or is the length of a hash value using PowerShell
Criteria
powershell.exe executing (Get-Item -Path ".\" -Verbose).FullName