T1424 Process Discovery
Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Recent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the hidepid mount feature. Prior to Android 7, applications could utilize the ps command or examine the /proc directory on the device.1
In iOS, applications have previously been able to use the sysctl command to obtain a list of running processes. This functionality has been removed in later iOS versions.
| Item | Value |
|---|---|
| ID | T1424 |
| Sub-techniques | |
| Tactics | TA0032 |
| Platforms | Android, iOS |
| Version | 2.1 |
| Created | 25 October 2017 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S0440 | Agent Smith | Agent Smith checks if a targeted application is running in user-space prior to infection.7 |
| S0422 | Anubis | Anubis can collect a list of running processes.4 |
| S1215 | Binary Validator | Binary Validator has obtained a list of running processes.13 |
| S1225 | CherryBlos | CherryBlos has used the Accessibility Service to monitor when a wallet application has launched.2 |
| S0421 | GolfSpy | GolfSpy can obtain a list of running processes.14 |
| S0544 | HenBox | HenBox can obtain a list of running processes.10 |
| S1185 | LightSpy | LightSpy has collected a list of running processes.98 |
| C0054 | Operation Triangulation | During Operation Triangulation, the threat actors have obtained a list of processes.5 |
| S0411 | Rotexy | Rotexy collects information about running processes.11 |
| S1055 | SharkBot | SharkBot can use Accessibility Services to detect which process is in the foreground.3 |
| S1216 | TriangleDB | TriangleDB has collected a list of running processes.5 |
| S0489 | WolfRAT | WolfRAT uses dumpsys to determine if certain applications are running.12 |
| S0311 | YiSpecter | YiSpecter has collected information about running processes.6 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1002 | Attestation | Attestation can typically detect rooted devices. For MDM-enrolled devices, action can be taken if a device fails an attestation check. |
| M1006 | Use Recent OS Version | Android 7 and later iOS versions introduced changes that prevent applications from performing Process Discovery without elevated privileges. |
References
-
Various. (2016, March 31). Overly restrictive SELinux filesystem permissions in Android N. Retrieved December 21, 2016. ↩
-
Trend Micro Research. (2023, July 28). Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns. Retrieved March 28, 2025. ↩
-
RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023. ↩
-
zLabs. (2019, November 12). How Zimperium’s z9 Detected Unknown Mobile Malware Overlooked by the AV Industry . Retrieved January 20, 2021. ↩
-
Kucherin, G., et al. (2023, June 21). Dissecting TriangleDB, a Triangulation spyware implant. Retrieved April 18, 2024. ↩↩
-
Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023. ↩
-
A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020. ↩
-
Dmitry Bestuzhev. (2025, April 7). The Coordinated Kill Switch: LightSpy’s iOS Destructive Plugin Architecture Manages Device Disablement. Retrieved April 14, 2025. ↩
-
ThreatFabric. (2024, October 29). LightSpy: Implant for iOS. Retrieved January 30, 2025. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan – banker and ransomware. Retrieved September 23, 2019. ↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
Kucherin, G., et al. (2023, October 23). The outstanding stealth of Operation Triangulation. Retrieved April 18, 2024. ↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩