EXPLORE
← Back to Explore
T1113

Screen Capture

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as <code>CopyFromScreen</code>, <code>xwd</code>, or <code>screencapture</code>.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)

LinuxWindowsmacOS
17
Detections
3
Sources
18
Threat Actors

BY SOURCE

9sigma5splunk_escu3elastic

PROCEDURES (10)

Exfiltrat3 detections

Auto-extracted: 3 detections for exfiltrat

Registry3 detections

Auto-extracted: 3 detections for registry

Process Creation Monitoring3 detections

Auto-extracted: 3 detections for process creation monitoring

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Credential1 detections

Auto-extracted: 1 detections for credential

Remote1 detections

Auto-extracted: 1 detections for remote

Credential1 detections

Auto-extracted: 1 detections for credential

Registry1 detections

Auto-extracted: 1 detections for registry

Script Block1 detections

Auto-extracted: 1 detections for script block

Remote1 detections

Auto-extracted: 1 detections for remote

DETECTIONS (17)