Detection of Data from Local System

Technique Detected:  Data from Local System | T0893

ID: DET0749
Domains: ICS
Analytics: AN1881
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1881

Monitor for unexpected/abnormal access to files that may be malicious collection of local data, such as user files (e.g., .pdf, .docx, .jpg, .dwg ) or local databases.
Monitor for newly executed processes that may search local system sources, such as file systems or local databases, to find files of interest and sensitive data.
Monitor for any suspicious attempts to enable scripts running on a system. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible to determine their actions and intent. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.
Monitor for API calls that may search local system sources, such as file systems or local databases, to find files of interest and sensitive data.
Monitor executed commands and arguments that may search and collect local system sources, such as file systems or local databases, to find files of interest and sensitive data. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.

Log Sources