Screen Capture
Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as <code>CopyFromScreen</code>, <code>xwd</code>, or <code>screencapture</code>.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)
BY SOURCE
PROCEDURES (10)
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 3 detections for registry
Auto-extracted: 3 detections for process creation monitoring
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for registry
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for remote