Home >
Enterprise >
Participants >
CyCraft >
System Information Discovery (T1082)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
2.A.2
|
Tactic Discovery (TA0007) |
|
||||
12.A.5
|
Tactic Discovery (TA0007) |
|
||||
13.A.6
|
Tactic Discovery (TA0007) |
|
||||
13.A.9
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
4.C.3
|
Tactic Discovery (TA0007) |
|
||||||
4.C.6
|
Tactic Discovery (TA0007) |
|
||||||
11.A.4
|
Tactic Discovery (TA0007) |
|
||||||
13.A.1
|
Tactic Discovery (TA0007) |
|
Procedure
Enumerated the computer hostname using PowerShell
Criteria
powershell.exe executing $env:COMPUTERNAME
Footnotes
- MSSP analysis that was performed on Windows Event Logs (Event ID 4104, PowerShell ScriptBlock Logs) would have been requested during a normal engagement when CyCraft MDR received insufficient information for analysis of adversary activity.


Procedure
Enumerated the OS version using PowerShell
Criteria
powershell.exe executing Gwmi Win32_OperatingSystem
Footnotes
- MSSP analysis that was performed on Windows Event Logs (Event ID 4104, PowerShell ScriptBlock Logs) would have been requested during a normal engagement when CyCraft MDR received insufficient information for analysis of adversary activity.

