T1082 SystemInformationDiscovery
T1082 - SystemInformationDiscovery¶
DESCRIPTION¶
The actor has executed commands to gather information about the storage devices on the local host
Example:
"cmd.exe /C "wmic path win32_logicaldisk get caption,filesystem,freespace,size,volumename"
Related
Volt Typhoon activity
Reference
https://www.cyber.gov.au/about-us/advisories/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
ATT&CK TACTICS¶
T1082 - System Information Discovery
Data source - Command
SENTINEL RULE QUERY¶
Triage¶
- Inspect which account and at what time the activity was performed
- Question the user if the activity was expected and approved
Version¶
Version 1.1 (date 07/02/2024)