Tasklist
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Tasklist can be used to enumerate security software currently running on a system by process name of known products.(Citation: Microsoft Tasklist) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G0016 | APT29 |
(Citation: CISA SoreFang July 2016) |
G0049 | OilRig |
(Citation: Palo Alto OilRig May 2016) (Citation: FireEye APT34 Dec 2017) |
G0072 | Honeybee |
(Citation: McAfee Honeybee) |
G0004 | Ke3chang |
(Citation: NCC Group APT15 Alive and Strong) |
G1006 | Earth Lusca |
(Citation: TrendMicro EarthLusca 2022) |
G0006 | APT1 |
(Citation: Mandiant APT1) |
G0027 | Threat Group-3390 |
(Citation: Trend Micro DRBControl February 2020) |
G0009 | Deep Panda |
(Citation: Alperovitch 2014) |
(Citation: Bitdefender FunnyDream Campaign November 2020) |
||
(Citation: McAfee Honeybee) |
||
G0010 | Turla |
(Citation: Kaspersky Turla) |
G0019 | Naikon |
(Citation: Baumgartner Naikon 2015) |
References
- Sherstobitoff, R. (2018, March 02). McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups. Retrieved May 16, 2018.
- Microsoft. (n.d.). Tasklist. Retrieved December 23, 2015.
- Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.
- Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.
- Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
- Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.
- Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.
- Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.
- CISA. (2020, July 16). MAR-10296782-1.v1 – SOREFANG. Retrieved September 29, 2020.
- Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
- Alperovitch, D. (2014, July 7). Deep in Thought: Chinese Targeting of National Security Think Tanks. Retrieved November 12, 2014.
- Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019.
- Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.