Skip to the content.

back

Find sigma rule :heavy_check_mark:

Attack: Screen Capture

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as CopyFromScreen, xwd, or screencapture.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)

MITRE

Tactic

technique

Test : Windows Screen Capture (CopyFromScreen)

OS

Description:

Take a screen capture of the desktop through a call to the Graphics.CopyFromScreen .NET API.

Executor

powershell

Sigma Rule

back