-
Notifications
You must be signed in to change notification settings - Fork 6
/
attack-pattern--0259baeb-9f63-4c69-bf10-eb038c390688.json
50 lines (50 loc) · 2.6 KB
/
attack-pattern--0259baeb-9f63-4c69-bf10-eb038c390688.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
{
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "T1113",
"url": "https://attack.mitre.org/techniques/T1113"
},
{
"external_id": "CAPEC-648",
"source_name": "capec",
"url": "https://capec.mitre.org/data/definitions/648.html"
},
{
"source_name": "CopyFromScreen .NET",
"url": "https://docs.microsoft.com/en-us/dotnet/api/system.drawing.graphics.copyfromscreen?view=netframework-4.8",
"description": "Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020."
},
{
"url": "https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/",
"description": "Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.",
"source_name": "Antiquated Mac Malware"
}
],
"description": "Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as <code>CopyFromScreen</code>, <code>xwd</code>, or <code>screencapture</code>.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)\n",
"name": "Screen Capture",
"created_by_ref": "The MITRE Corporation",
"id": "attack-pattern--0259baeb-9f63-4c69-bf10-eb038c390688",
"type": "attack-pattern",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "collection"
}
],
"modified": "2020-03-24T19:56:37.627Z",
"created": "2017-05-31T21:31:25.060Z",
"x_mitre_is_subtechnique": false,
"x_mitre_version": "1.1",
"x_mitre_data_sources": [
"API monitoring",
"Process monitoring",
"File monitoring"
],
"x_mitre_detection": "Monitoring for screen capture behavior will depend on the method used to obtain data from the operating system and write output files. Detection methods could include collecting information from unusual processes using API calls used to obtain image data, and monitoring for image files written to disk. The sensor data may need to be correlated with other events to identify malicious activity, depending on the legitimacy of this behavior within a given network environment.",
"x_mitre_platforms": [
"Linux",
"macOS",
"Windows"
]
}