Home  >  APT29  >  Results  >  Elastic  >  Process Discovery

Technique Results: Process Discovery (T1057) Technique Page Information

The ATT&CK technique page displays all procedures used to test the technique, and their respective detections. The Procedure column contains a description of how the technique was tested . The Step column is where the procedure occurred in the operational flow. Click the Step Number to view it in the Operational Flow panel. Detections are classified by one or more Detection Types, summarized by the Detection Notes, and may be supported by screenshots.

MITRE does not assign scores, rankings, or ratings. The evaluation results are available to the public, so other organizations may provide their own analysis and interpretation - these are not endorsed or validated by MITRE.

Vendor Configuration     All Results JSON Legend
Legend
Main Detection Categories: Detection Modifiers:

None

Telemetry

Indicator of
Compromise

General
Behavior

MSSP

General

Tactic

Specific
Behavior

Technique

Enrichment

Tainted

Alert

Correlated

Delayed

Host
Interrogation

Residual
Artifact

Configuration
Change

Innovative
Procedures Criteria Step
Detection Type Detection Notes
Enumerated current running processes using PowerShell
powershell.exe executing Get-Process
4.B.1
Telemetry (Correlated)
Telemetry showed powershell.exe executing Get-Process. The detection was correlated to a parent alert for malicious file execution. [1]
Enumerated the current process ID using PowerShell
powershell.exe executing $PID
4.C.5
Telemetry (Correlated)
Telemetry showed powershell.exe executing $PID. The event was correlated to a parent General detection for malicious file execution. [1]
Enumerated processes on remote host Scranton (10.0.1.4) using PowerShell
powershell.exe executing Get-Process
8.A.3
Telemetry (Correlated)
Telemetry showed wsmprovhost.exe executing Get-Process. The event was correlated to a parent General detection for malicious file execution. [1]
Checked that processes such as procexp.exe, taskmgr.exe, or wireshark.exe are not running using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_Process
11.A.8
Tactic (Alert)
A Tactic alert detection (medium severity) called "Reconnaissance of Multiple WMI Classes" was generated for powershell.exe enumerating WMI classes associated with System Information Discovery. [1]
Telemetry
Telemetry showed the PowerShell gwmi query for Win32_Process. [1]
Enumerated running processes using the CreateToolhelp32Snapshot API
powershell.exe executing the CreateToolhelp32Snapshot API
13.D.1
Telemetry (Correlated)
Telemetry showed PowerShell calling the CreateToolhelp32Snapshot API. The detection was correlated to a parent alert for a suspicious Windows script. [1]
Enumerated and tracked PowerShell processes using PowerShell
powershell.exe executing Get-Process
14.B.2
Technique (Correlated, Alert)
A Technique alert detection (medium severity) for "Process Discovery via WMI" was generated for PowerShell executing Get-Process. The detection was correlated to a parent alert for a suspicious Windows script. [1]
Telemetry (Correlated)
Telemetry showed PowerShell executing Get-Process. The detection was correlated to a parent alert for a suspicious Windows script. [1]