EXPLORE
← Back to Explore
T1082

System Information Discovery

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use this information to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. This behavior is distinct from [Local Storage Discovery](https://attack.mitre.org/techniques/T1680) which is an adversary's discovery of local drive, disks and/or volumes...

ESXiIaaSLinuxmacOSNetwork DevicesWindows
80
Detections
3
Sources
55
Threat Actors

BY SOURCE

33elastic31sigma16splunk_escu

PROCEDURES (37)

Process Creation Monitoring10 detections

Auto-extracted: 10 detections for process creation monitoring

General Monitoring8 detections

Auto-extracted: 8 detections for general monitoring

Exfiltrat4 detections

Auto-extracted: 4 detections for exfiltrat

Container3 detections

Auto-extracted: 3 detections for container

Network Connection Monitoring3 detections

Auto-extracted: 3 detections for network connection monitoring

Container3 detections

Auto-extracted: 3 detections for container

Wmi3 detections

Auto-extracted: 3 detections for wmi

Kernel3 detections

Auto-extracted: 3 detections for kernel

Kernel3 detections

Auto-extracted: 3 detections for kernel

Unusual3 detections

Auto-extracted: 3 detections for unusual

Persist2 detections

Auto-extracted: 2 detections for persist

Kernel2 detections

Auto-extracted: 2 detections for kernel

Persist2 detections

Auto-extracted: 2 detections for persist

Remote2 detections

Auto-extracted: 2 detections for remote

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Wmi2 detections

Auto-extracted: 2 detections for wmi

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Child Process2 detections

Auto-extracted: 2 detections for child process

Unusual2 detections

Auto-extracted: 2 detections for unusual

Registry2 detections

Auto-extracted: 2 detections for registry

Lateral1 detections

Auto-extracted: 1 detections for lateral

Privilege1 detections

Auto-extracted: 1 detections for privilege

Cloud1 detections

Auto-extracted: 1 detections for cloud

Azure1 detections

Auto-extracted: 1 detections for azure

Wmi1 detections

Auto-extracted: 1 detections for wmi

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Privilege1 detections

Auto-extracted: 1 detections for privilege

Remote1 detections

Auto-extracted: 1 detections for remote

Authentication Monitoring1 detections

Auto-extracted: 1 detections for authentication monitoring

Service1 detections

Auto-extracted: 1 detections for service

Powershell1 detections

Auto-extracted: 1 detections for powershell

Lateral1 detections

Auto-extracted: 1 detections for lateral

Cloud1 detections

Auto-extracted: 1 detections for cloud

Powershell1 detections

Auto-extracted: 1 detections for powershell

Credential1 detections

Auto-extracted: 1 detections for credential

Wmi1 detections

Auto-extracted: 1 detections for wmi

Wmi1 detections

Auto-extracted: 1 detections for wmi

DETECTIONS (80)

Bitbucket User Details Export Attempt Detected
sigmamedium
Bitbucket User Permissions Export Attempt
sigmamedium
Cisco ASA - Reconnaissance Command Activity
splunk_escu
Cisco Discovery
sigmalow
Container Residence Discovery Via Proc Virtual FS
sigmalow
Detect attackers scanning for vulnerable JBoss servers
splunk_escu
Discovery Command Output Written to Suspicious File
elasticmedium
Docker Container Discovery Via Dockerenv Listing
sigmalow
Entra ID Sign-in BloodHound Suite User-Agent Detected
elasticmedium
Entra ID Sign-in TeamFiltration User-Agent Detected
elasticmedium
Enumeration Command Spawned via WMIPrvSE
elasticlow
Environment Variable Enumeration Detected via Defend for Containers
elasticlow
ESXi System Information Discovery
splunk_escu
HackTool - PCHunter Execution
sigmahigh
HackTool - winPEAS Execution
sigmahigh
HackTool - WinPwn Execution
sigmahigh
HackTool - WinPwn Execution - ScriptBlock
sigmahigh
Hping Process Activity
elasticmedium
Interactive Privilege Boundary Enumeration Detected via Defend for Containers
elasticlow
Kernel Instrumentation Discovery via kprobes and tracefs
elasticlow
Kernel Seeking Activity
elasticmedium
Kernel Unpacking Activity
elasticmedium
Linux Auditd Kernel Module Enumeration
splunk_escu
Linux Kernel Module Enumeration
splunk_escu
Manual Mount Discovery via /etc/exports or /etc/fstab
elasticmedium
Network Reconnaissance Activity
sigmahigh
OS Architecture Discovery Via Grep
sigmalow
Pluggable Authentication Module (PAM) Version Discovery
elasticlow
Polkit Version Discovery
elasticlow
Potential Container Discovery Via Inodes Listing
sigmalow
Potential GobRAT File Discovery Via Grep
sigmahigh
Potential Linux Hack Tool Launched
elasticmedium
Potential Meterpreter Reverse Shell
elastichigh
Potential Product Class Reconnaissance Via Wmic.EXE
sigmamedium
Potential Suspicious Activity Using SeCEdit
sigmamedium
PowerShell Suspicious Discovery Related Windows API Functions
elasticlow
PUA - System Informer Execution
sigmamedium
Service Account Namespace Read Detected via Defend for Containers
elasticlow
Suspicious Execution of Hostname
sigmalow
Suspicious Execution of Systeminfo
sigmalow
Suspicious JetBrains TeamCity Child Process
elasticmedium
Suspicious Kernel Dump Using Dtrace
sigmahigh
Suspicious Kernel Feature Activity
elasticmedium
Suspicious MS Office Child Process
elasticmedium
Suspicious PDF Reader Child Process
elasticlow
Suspicious Query of MachineGUID
sigmalow
Suspicious React Server Child Process
elastichigh
Suspicious SIP Check by macOS Application
elasticmedium
Suspicious System Commands Executed by Previously Unknown Executable
elasticlow
Suspicious which Enumeration
elasticlow
System and Hardware Information Discovery
sigmainformational
System and Network Configuration Check
elasticmedium
System Disk And Volume Reconnaissance Via Wmic.EXE
sigmamedium
System Info Discovery via Sysinfo Syscall
sigmalow
System Information Discovery
sigmainformational
System Information Discovery - Auditd
sigmalow
System Information Discovery Detection
splunk_escu
System Information Discovery Using Ioreg
sigmamedium
System Information Discovery Using sw_vers
sigmamedium
System Information Discovery Using System_Profiler
sigmamedium
System Information Discovery via dmidecode from Parent Shell
elasticlow
System Information Discovery via Registry Queries
sigmalow
System Information Discovery Via Sysctl - MacOS
sigmamedium
Uncommon System Information Discovery Via Wmic.EXE
sigmamedium
Unusual Instance Metadata Service (IMDS) API Request
elasticmedium
Unusual Kernel Module Enumeration
elasticlow
Unusual Linux System Information Discovery Activity
elasticlow
Virtual Machine Fingerprinting
elastichigh
Virtual Machine Fingerprinting via Grep
elasticmedium
Web Servers Executing Suspicious Processes
splunk_escu
Windows Information Discovery Fsutil
splunk_escu
Windows Post Exploitation Risk Behavior
splunk_escu
Windows PowerShell Invoke-RestMethod IP Information Collection
splunk_escu
Windows PsTools Recon Usage
splunk_escu
Windows Wmic CPU Discovery
splunk_escu
Windows Wmic DiskDrive Discovery
splunk_escu
Windows Wmic Memory Chip Discovery
splunk_escu
Windows Wmic Network Discovery
splunk_escu
Windows Wmic Systeminfo Discovery
splunk_escu
Yum/DNF Plugin Status Discovery
elasticlow