Common Information
Type Value
Value
Process Discovery - T1057
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software running on systems within the network. ===Windows=== An example command that would obtain details on processes is "tasklist" using the Tasklist utility. ===Mac and Linux=== In Mac and Linux, this is accomplished with the <code>ps</code> command. Detection: System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Normal, benign system and network events that look like process discovery may be uncommon, depending on the environment and how they are used. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell. Platforms: Linux, macOS, Windows Data Sources: Process command-line parameters, Process monitoring Permissions Required: User, Administrator, SYSTEM System Requirements: Administrator, SYSTEM may provide better process ownership details
Details Published Attributes CTI Title
Details Website 2024-04-01 124 From OneNote to RansomNote: An Ice Cold Intrusion
Details Website 2024-03-25 39 APT29 Uses WINELOADER to Target German Political Parties | Google Cloud Blog
Details Website 2024-03-18 96 Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
Details Website 2024-03-18 96 Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
Details Website 2024-01-30 109 Recent DarkGate Activity & Trends
Details Website 2024-01-04 63 ATT&CK을 이용해 스스로 평가하기(APT3, Second Scenario)
Details Website 2024-01-01 28 I am Goot (Loader)
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-19 117 LitterDrifter: a new USB worm used by the Gamaredon group
Details Website 2023-11-06 203 SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite
Details Website 2023-11-02 27 New Java-Based Sayler RAT Targets Polish Speaking Users
Details Website 2023-11-01 44 Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs
Details Website 2023-10-30 154 NetSupport Intrusion Results in Domain Compromise - The DFIR Report
Details Website 2023-10-27 117 A cascade of compromise: unveiling Lazarus' new campaign
Details Website 2023-10-27 0 Process Mining: A Brief Introduction
Details Website 2023-10-25 94 A pirated program downloaded from a torrent site infected hundreds of thousands of users
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-17 73 BbyStealer Malware Resurfaces, Sets Sights on VPN Users
Details Website 2023-10-17 92 Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More. – Anomali
Details Website 2023-10-11 38 Global ESXiArgs ransomware attack on the back of a two-year-old vulnerability
Details Website 2023-10-05 73 LostTrust Ransomware | Latest Multi-Extortion Threat Shares Traits with SFile and Mindware
Details Website 2023-09-29 62 PurpleFox Resurfaces Via Spam Emails:  A Look Into Its Recent Campaign
Details Website 2023-09-28 49 Trade with caution - bad guys are stealing
Details Website 2023-09-26 37 Exela Stealer Spotted Targeting Social Media Giants
Details Website 2023-09-24 49 Deadglyph: a new advanced backdoor from Stealth Falcon