Skip to main content
T1057Discoveryeasy difficulty

Process Discovery

Process Discovery (T1057) is a MITRE ATT&CK technique in the Discovery tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Process Discovery?

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software running on systems within the network. Adversaries may use the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully invests in a compromise. Enumerating running processes helps attackers understand what security tools are installed and running, identify application servers and databases as lateral movement targets, and find processes to inject into for defense evasion. On Windows, tasklist.exe and the Get-Process PowerShell cmdlet are commonly used, while ps and /proc filesystem enumeration are used on Linux. Security-conscious attackers use process discovery to identify and selectively terminate security tools before performing sensitive operations and to understand which processes represent high-value injection targets for defense evasion.

Process Discovery is documented as technique T1057 in the MITRE ATT&CK knowledge base under the Discovery tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Process Discovery activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor for execution of process enumeration commands including tasklist.exe, wmic process list, and Get-Process from non-administrative accounts or from processes that do not normally perform process enumeration.

  2. 2

    Alert on process enumeration followed immediately by process termination targeting security tools, as attackers typically enumerate processes to identify security software before attempting to disable or terminate it.

  3. 3

    Detect automated process enumeration tools that query the Windows process list or Linux procfs at high frequency, which is a signature of post-exploitation framework functionality performing environment reconnaissance.

  4. 4

    Monitor for cross-process queries using OpenProcess with PROCESS_QUERY_INFORMATION access rights against many processes in rapid succession, as this is the API-based equivalent of running tasklist and provides more detailed process information.

  5. 5

    Track process enumeration events on sensitive systems including domain controllers and database servers, as attackers targeting these systems perform process discovery to understand running services before attempting exploitation or disruption.

Example Alerts

These realistic alert examples show what Process Discovery looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Security Tool Discovery Preceding Defense Evasion

Tasklist.exe executed and output filtered for security product process names including defender, edr, sentinel, crowdstrike, and carbon. Immediately following this discovery step, sc.exe stop and taskkill commands targeted the identified security processes. This deliberate enumeration before targeted termination of security tools is a characteristic pre-execution step in ransomware and sophisticated APT operations.

MediumSIEM

Automated Process Enumeration on Domain Controller

WMIC process list brief command executed on domain controller DC-SECONDARY from a remote workstation via WMI. The executing account is a standard domain user account with no administrative access to domain controllers. Remote process enumeration of a domain controller without authorization is a significant reconnaissance event that provides attackers with information about security tools and services running on the most sensitive server in the environment.

MediumXDR

Process List Exported and Staged for Exfiltration

Command sequence detected: tasklist /v > C:\Users\Public\sysinfo.txt followed by systeminfo >> C:\Users\Public\sysinfo.txt and the resulting file appended to a collection archive. Exporting detailed process and system information to a staging file for exfiltration indicates a methodical attacker performing comprehensive environment reconnaissance to plan subsequent attack phases against specifically identified software and service versions.

Practice Detecting Process Discovery

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Process Discovery. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Process Discovery?
SOC analysts detect Process Discovery (T1057) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for execution of process enumeration commands including tasklist.exe, wmic process list, and get-process from non-administrative accounts or f. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Process Discovery?
Process Discovery can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the discovery phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Process Discovery in real-world attacks?
Process Discovery is a well-documented MITRE ATT&CK technique in the Discovery tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Process Discovery scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Process Discovery for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Discovery techniques like Process Discovery. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more