| ID | Name |
|---|---|
| T1518.001 | Security Software Discovery |
| T1518.002 | Backup Software Discovery |
Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as Data Destruction, Inhibit System Recovery, or Data Encrypted for Impact.
Commands that can be used to obtain security software information are netsh, reg query with Reg, dir with cmd, and Tasklist, but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for, such as Veeam, Acronis, Dropbox, or Paragon.[1]
| ID | Name | Description |
|---|---|---|
| G0102 | Wizard Spider |
Wizard Spider has utilized the PowerShell script |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0088 | Backup Software Discovery via CLI, Registry, and Process Inspection (T1518.002) | AN0240 |
Defender observes execution of commands like |
| AN0241 |
Defender observes use of CLI tools ( |
||
| AN0242 |
Defender detects execution of |