T1518 Software Discovery
Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable to Exploitation for Privilege Escalation.
Item | Value |
---|---|
ID | T1518 |
Sub-techniques | T1518.001 |
Tactics | TA0007 |
Platforms | Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Permissions required | Administrator, User |
Version | 1.3 |
Created | 16 September 2019 |
Last Modified | 30 March 2023 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0534 | Bazar | Bazar can query the Registry for installed applications.21 |
G0060 | BRONZE BUTLER | BRONZE BUTLER has used tools to enumerate software installed on an infected host.9 |
S0482 | Bundlore | Bundlore has the ability to enumerate what browser is being used as well as version information for Safari.3 |
S0674 | CharmPower | CharmPower can list the installed applications on a compromised host.2 |
S0154 | Cobalt Strike | The Cobalt Strike System Profiler can discover applications through the browser and identify the version of Java the target has.6 |
S0126 | ComRAT | ComRAT can check the victim’s default browser to determine which process to inject its communications module into.18 |
S0472 | down_new | down_new has the ability to gather information on installed applications.9 |
S0384 | Dridex | Dridex has collected a list of installed software on the system.27 |
S0062 | DustySky | DustySky lists all installed software for the infected machine.19 |
S0024 | Dyre | Dyre has the ability to identify installed programs on a compromised host.28 |
G1001 | HEXANE | HEXANE has enumerated programs installed on an infected machine.32 |
S0431 | HotCroissant | HotCroissant can retrieve a list of applications from the SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths registry key.4 |
G0100 | Inception | Inception has enumerated installed software on compromised systems.31 |
S0260 | InvisiMole | InvisiMole can collect information about installed software used by specific users, software executed on user login, and software executed by each system.1415 |
S0526 | KGH_SPY | KGH_SPY can collect information on installed applications.5 |
S0652 | MarkiRAT | MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.26 |
S0455 | Metamorfo | Metamorfo has searched the compromised system for banking applications.78 |
G0069 | MuddyWater | MuddyWater has used a PowerShell backdoor to check for Skype connectivity on the target machine.29 |
G0129 | Mustang Panda | Mustang Panda has searched the victim system for the InstallUtil.exe program and its version.34 |
C0016 | Operation Dust Storm | During Operation Dust Storm, the threat actors deployed a file called DeployJava.js to fingerprint installed software on a victim system prior to exploit delivery.39 |
C0014 | Operation Wocao | During Operation Wocao, threat actors collected a list of installed software on the infected system.40 |
S0229 | Orz | Orz can gather the victim’s Internet Explorer version.20 |
S0598 | P.A.S. Webshell | P.A.S. Webshell can list PHP server configuration details.12 |
S0650 | QakBot | QakBot can enumerate a list of installed programs.11 |
S0148 | RTM | RTM can scan victim drives to look for specific banking software on the machine to determine next actions.16 |
S0445 | ShimRatReporter | ShimRatReporter gathered a list of installed software on the infected host.1 |
G1008 | SideCopy | SideCopy has collected browser information from a compromised host.30 |
G0121 | Sidewinder | Sidewinder has used tools to enumerate software installed on an infected host.3738 |
S0623 | Siloscape | Siloscape searches for the kubectl binary.22 |
S0646 | SpicyOmelette | SpicyOmelette can enumerate running software on a targeted system.17 |
S1042 | SUGARDUMP | SUGARDUMP can identify Chrome, Opera, Edge Chromium, and Firefox browsers, including version number, on a compromised host.23 |
S1064 | SVCReady | SVCReady can collect a list of installed software from an infected host.25 |
S0467 | TajMahal | TajMahal has the ability to identify the Internet Explorer (IE) version on an infected host.13 |
G0081 | Tropic Trooper | Tropic Trooper‘s backdoor could list the infected system’s installed software.35 |
G0124 | Windigo | Windigo has used a script to detect installed software on targeted systems.33 |
G0112 | Windshift | Windshift has used malware to identify installed software.36 |
S1065 | Woody RAT | Woody RAT can collect .NET, PowerShell, and Python information from an infected host.24 |
S0658 | XCSSET | XCSSET uses ps aux with the grep command to enumerate common browsers and system processes potentially impacting XCSSET‘s exfiltration capabilities.10 |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0018 | Firewall | Firewall Enumeration |
DS0009 | Process | OS API Execution |
References
-
Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020. ↩
-
Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022. ↩
-
Sushko, O. (2019, April 17). macOS Bundlore: Mac Virus Bypassing macOS Security Features. Retrieved June 30, 2020. ↩
-
Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020. ↩
-
Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020. ↩
-
Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021. ↩
-
Sierra, E., Iglesias, G.. (2018, April 24). Metamorfo Campaigns Targeting Brazilian Users. Retrieved July 30, 2020. ↩
-
ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021. ↩
-
Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020. ↩↩
-
Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021. ↩
-
Group IB. (2020, September). LOCK LIKE A PRO. Retrieved September 27, 2021. ↩
-
ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021. ↩
-
GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019. ↩
-
Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018. ↩
-
Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020. ↩
-
Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017. ↩
-
CTU. (2018, September 27). Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish. Retrieved September 20, 2021. ↩
-
Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020. ↩
-
GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020. ↩
-
Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018. ↩
-
Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. ↩
-
Prizmant, D. (2021, June 7). Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments. Retrieved June 9, 2021. ↩
-
Mandiant Israel Research Team. (2022, August 17). Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors. Retrieved September 21, 2022. ↩
-
MalwareBytes Threat Intelligence Team. (2022, August 3). Woody RAT: A new feature-rich malware spotted in the wild. Retrieved December 6, 2022. ↩
-
Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022. ↩
-
GReAT. (2021, June 16). Ferocious Kitten: 6 Years of Covert Surveillance in Iran. Retrieved September 22, 2021. ↩
-
Check Point Research. (2021, January 4). Stopping Serial Killer: Catching the Next Strike. Retrieved September 7, 2021. ↩
-
hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020. ↩
-
Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021. ↩
-
Threat Intelligence Team. (2021, December 2). SideCopy APT: Connecting lures victims, payloads to infrastructure. Retrieved June 13, 2022. ↩
-
Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020. ↩
-
Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022. ↩
-
Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020. ↩
-
Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021. ↩
-
Chen, J.. (2020, May 12). Tropic Trooper’s Back: USBferry Attack Targets Air gapped Environments. Retrieved May 20, 2020. ↩
-
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021. ↩
-
Hegel, T. (2021, January 13). A Global Perspective of the SideWinder APT. Retrieved January 27, 2021. ↩
-
Rewterz. (2020, April 20). Sidewinder APT Group Campaign Analysis. Retrieved January 29, 2021. ↩
-
Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. ↩
-
Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020. ↩