T1120: Peripheral Device Discovery

Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system. Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

Windows: — Monitoring of events with IDs 4103 and 4104 (PowerShell) where command line input contains 'Get-WMIObject Win32_PnPEntity'. — Monitoring of events related to execution of the WinPwn.ps1 cmdlet or its command 'printercheck'. — Monitoring of process-start events where command line input contains 'fsutil fsinfo drives'. Linux: — Monitoring of process-start events where command line input contains 'lsusb', 'dmesg', 'usb-devices', 'lsblk', 'blkid', or 'fdisk -l'.

Expert Required. The technique is detected only with the combination of «PT Product + Expert»

Detection

IDDS0017Data source and componentCommand: Command ExecutionDescription

Monitor executed commands and arguments that may attempt to gather information about attached peripheral devices and components connected to a computer system.

IDDS0009Data source and componentProcess: OS API ExecutionDescription

Monitor for API calls that may attempt to gather information about attached peripheral devices and components connected to a computer system.

IDDS0009Data source and componentProcess: Process CreationDescription

Monitor for newly executed processes that may attempt to gather information about attached peripheral devices and components connected to a computer system.