Screen Capture

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as CopyFromScreen, xwd, or screencapture.[1][2]

ID: T1113
Sub-techniques:  No sub-techniques
Tactic: Collection
Platforms: Linux, Windows, macOS
Version: 1.1
Created: 31 May 2017
Last Modified: 15 April 2025

Procedure Examples

ID Name Description
S0331 Agent Tesla

Agent Tesla can capture screenshots of the victim’s desktop.[3][4][5][6][7]

S0622 AppleSeed

AppleSeed can take screenshots on a compromised host by calling a series of APIs.[8][9]

G0007 APT28

APT28 has used tools to take screenshots from victims.[10][11][12][13]

G0087 APT39

APT39 has used a screen capture utility to take screenshots on a compromised host.[14][15]

G1044 APT42

APT42 has used malware, such as GHAMBAR and POWERPOST, to take screenshots.[16]

S0456 Aria-body

Aria-body has the ability to capture screenshots on compromised hosts.[17]

S1087 AsyncRAT

AsyncRAT has the ability to view the screen on compromised hosts.[18]

S0438 Attor

Attor's has a plugin that captures screenshots of the target applications.[19]

S0344 Azorult

Azorult can capture screenshots of the victim’s machines.[20]

S1081 BADHATCH

BADHATCH can take screenshots and send them to an actor-controlled C2 server.[21]

S0128 BADNEWS

BADNEWS has a command to take a screenshot and send it to the C2 server.[22][23]

S0337 BadPatch

BadPatch captures screenshots in .jpg format and then exfiltrates them.[24]

S0234 Bandook

Bandook is capable of taking an image of and uploading the current desktop.[25][26]

S0017 BISCUIT

BISCUIT has a command to periodically take screenshots of the system.[27]

S0089 BlackEnergy

BlackEnergy is capable of taking screenshots.[28]

S0657 BLUELIGHT

BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter.[29]

G0060 BRONZE BUTLER

BRONZE BUTLER has used a tool to capture screenshots.[30][31]

S1063 Brute Ratel C4

Brute Ratel C4 can take screenshots on compromised hosts.[32]

S0454 Cadelspy

Cadelspy has the ability to capture screenshots and webcam photos.[33]

S0351 Cannon

Cannon can take a screenshot of the desktop.[34]

S0030 Carbanak

Carbanak performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.[35]

S0484 Carberp

Carberp can capture display screenshots with the screens_dll.dll plugin.[36]

S0348 Cardinal RAT

Cardinal RAT can capture screenshots.[37]

S0261 Catchamas

Catchamas captures screenshots based on specific keywords in the window’s title.[38]

S0631 Chaes

Chaes can capture screenshots of the infected machine.[39]

S0674 CharmPower

CharmPower has the ability to capture screenshots.[40]

S1149 CHIMNEYSWEEP

CHIMNEYSWEEP can capture screenshots on targeted systems using a timer and either upload them or store them to disk.[41]

S0023 CHOPSTICK

CHOPSTICK has the capability to capture screenshots.[12]

S0667 Chrommme

Chrommme has the ability to capture screenshots.[42]

S0660 Clambling

Clambling has the ability to capture screenshots.[43]

S0154 Cobalt Strike

Cobalt Strike's Beacon payload is capable of capturing screenshots.[44][45][46]

S0338 Cobian RAT

Cobian RAT has a feature to perform screen capture.[47]

S0591 ConnectWise

ConnectWise can take screenshots on remote hosts.[48]

S0050 CosmicDuke

CosmicDuke takes periodic screenshots and exfiltrates them.[49]

S0115 Crimson

Crimson contains a command to perform screen captures.[50][51][52]

S0235 CrossRAT

CrossRAT is capable of taking screen captures.[25]

S1153 Cuckoo Stealer

Cuckoo Stealer can run screencapture to collect screenshots from compromised hosts. [53]

G0070 Dark Caracal

Dark Caracal took screenshots using their Windows malware.[25]

S0187 Daserf

Daserf can take screenshots.[54][30]

S0021 Derusbi

Derusbi is capable of performing screen captures.[55]

S0213 DOGCALL

DOGCALL is capable of capturing screenshots of the victim's machine.[56][57]

G0035 Dragonfly

Dragonfly has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).[58][59][60]

S1159 DUSTTRAP

DUSTTRAP can capture screenshots.[61]

S0062 DustySky

DustySky captures PNG screenshots of the main screen.[62]

S0593 ECCENTRICBANDWAGON

ECCENTRICBANDWAGON can capture screenshots and store them locally.[63]

S0363 Empire

Empire is capable of capturing screenshots on Windows and macOS systems.[64]

S0152 EvilGrab

EvilGrab has the capability to capture screenshots.[65]

G0046 FIN7

FIN7 captured screenshots and desktop video recordings.[66]

S0182 FinFisher

FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.[67][68]

S0143 Flame

Flame can take regular screenshots when certain applications are open that are sent to the command and control server.[69]

S0381 FlawedAmmyy

FlawedAmmyy can capture screenshots.[70]

S0277 FruitFly

FruitFly takes screenshots of the user's desktop.[71]

S1044 FunnyDream

The FunnyDream ScreenCap component can take screenshots on a compromised host.[72]

G0047 Gamaredon Group

Gamaredon Group's malware can take screenshots of the compromised computer every minute.[73]

S0032 gh0st RAT

gh0st RAT can capture the victim’s screen remotely.[74]

G0115 GOLD SOUTHFIELD

GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.[75]

S0417 GRIFFON

GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.[76]

G0043 Group5

Malware used by Group5 is capable of watching the victim's screen.[77]

S0151 HALFBAKED

HALFBAKED can obtain screenshots from the victim.[78]

S0431 HotCroissant

HotCroissant has the ability to do real time screen viewing on an infected host.[79]

S0203 Hydraq

Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host.[80]

S0398 HyperBro

HyperBro has the ability to take screenshots.[81]

S0260 InvisiMole

InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.[82][83]

S0163 Janicab

Janicab captured screenshots and sent them out to a C2 server.[84][85]

S0044 JHUHUGIT

A JHUHUGIT variant takes screenshots by simulating the user pressing the "Take Screenshot" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.[86][87]

S0283 jRAT

jRAT has the capability to take screenshots of the victim’s machine.[88][89]

S0088 Kasidet

Kasidet has the ability to initiate keylogging and screen captures.[90]

S0265 Kazuar

Kazuar captures screenshots of the victim’s screen.[91]

S0387 KeyBoy

KeyBoy has a command to perform screen grabbing.[92]

S0271 KEYMARBLE

KEYMARBLE can capture screenshots of the victim’s machine.[93]

G0094 Kimsuky

Kimsuky has captured browser screenshots using TRANSLATEXT.[94]

S0437 Kivars

Kivars has the ability to capture screenshots on the infected host.[95]

S0356 KONNI

KONNI can take screenshots of the victim’s machine.[96]

S1185 LightSpy

LightSpy uses Apple's built-in AVFoundation Framework library to access the user's camera and screen. It uses the AVCaptureStillImage to take a picture using the user's camera and the AVCaptureScreen to take a screenshot or record the user's screen for a specified period of time.[97]

S0680 LitePower

LitePower can take system screenshots and save them to %AppData%.[98]

S0681 Lizar

Lizar can take JPEG screenshots of an infected system.[99][100]

S0582 LookBack

LookBack can take desktop screenshots.[101]

S1213 Lumma Stealer

Lumma Stealer has taken screenshots of victim machines.[102]

S1142 LunarMail

LunarMail can capture screenshots from compromised hosts.[103]

S0409 Machete

Machete captures screenshots.[104][105][106][107]

S1016 MacMa

MacMa has used Apple’s Core Graphic APIs, such as CGWindowListCreateImageFromArray, to capture the user's screen and open windows.[108][109]

S0282 MacSpy

MacSpy can capture screenshots of the desktop over multiple monitors.[71]

S1060 Mafalda

Mafalda can take a screenshot of the target machine and save it to a file.[110]

G0059 Magic Hound

Magic Hound malware can take a screenshot and upload the file to its C2 server.[111]

S1156 Manjusaka

Manjusaka can take screenshots of the victim desktop.[112]

S0652 MarkiRAT

MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’.[113]

S0167 Matryoshka

Matryoshka is capable of performing screen captures.[114][115]

S1059 metaMain

metaMain can take and save screenshots.[110][116]

S0455 Metamorfo

Metamorfo can collect screenshots of the victim’s machine.[117][118]

S0339 Micropsia

Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API.[119]

S1122 Mispadu

Mispadu has the ability to capture screenshots on compromised hosts.[120][121][122][123]

G1019 MoustachedBouncer

MoustachedBouncer has used plugins to take screenshots on targeted systems.[124]

G0069 MuddyWater

MuddyWater has used malware that can capture screenshots of the victim’s machine.[125]

S0198 NETWIRE

NETWIRE can capture the victim's screen.[126][127][128][129]

S1090 NightClub

NightClub can load a module to call CreateCompatibleDC and GdipSaveImageToStream for screen capture.[124]

S0385 njRAT

njRAT can capture screenshots of the victim’s machines.[130]

S1107 NKAbuse

NKAbuse can take screenshots of the victim machine.[131]

S0644 ObliqueRAT

ObliqueRAT can capture a screenshot of the current screen.[132]

S0340 Octopus

Octopus can capture screenshots of the victims’ machine.[133][134][135]

G0049 OilRig

OilRig has a tool called CANDYKING to capture a screenshot of user's desktop.[136]

S1050 PcShare

PcShare can take screen shots of a compromised machine.[72]

S0643 Peppy

Peppy can take screenshots on targeted systems.[50]

S0013 PlugX

PlugX allows the operator to capture screenshots.[137]

S0428 PoetRAT

PoetRAT has the ability to take screen captures.[138][139]

S0216 POORAIM

POORAIM can perform screen capturing.[56]

S0194 PowerSploit

PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.[140][141]

S0223 POWERSTATS

POWERSTATS can retrieve screenshots from compromised hosts.[142][143]

S0184 POWRUNER

POWRUNER can capture a screenshot from a victim.[144]

S0113 Prikormka

Prikormka contains a module that captures screenshots of the victim's desktop.[145]

S0279 Proton

Proton captures the content of the desktop with the screencapture binary.[71]

S0147 Pteranodon

Pteranodon can capture screenshots at a configurable interval.[146][147]

S0192 Pupy

Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.[148]

S1209 Quick Assist

Quick Assist allows for the remote administrator to take screenshots of the running system.[149]

S0686 QuietSieve

QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under Temp\SymbolSourceSymbols\icons or Temp\ModeAuto\icons.[150]

S1148 Raccoon Stealer

Raccoon Stealer can capture screenshots from victim systems.[151][152]

S0629 RainyDay

RainyDay has the ability to capture screenshots.[153]

S0458 Ramsay

Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.[154]

S0662 RCSession

RCSession can capture screenshots from a compromised host.[155]

S0495 RDAT

RDAT can take a screenshot on the infected system.[156]

S0153 RedLeaves

RedLeaves can capture screenshots.[157][158]

S0332 Remcos

Remcos takes automated screenshots of the infected machine.[159]

S0375 Remexi

Remexi takes screenshots of windows of interest.[160]

S0592 RemoteUtilities

RemoteUtilities can take screenshots on a compromised host.[161]

S0379 Revenge RAT

Revenge RAT has a plugin for screen capture.[162]

S0270 RogueRobin

RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.[163]

S0240 ROKRAT

ROKRAT can capture screenshots of the infected system using the gdi32 library.[164][165][166][167][168]

S0090 Rover

Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.[169]

S0148 RTM

RTM can capture screenshots.[170][171]

S0546 SharpStage

SharpStage has the ability to capture the victim's screen.[172][173]

S0217 SHUTTERSPEED

SHUTTERSPEED can capture screenshots.[56]

G0091 Silence

Silence can capture victim screen activity.[174][175]

S0692 SILENTTRINITY

SILENTTRINITY can take a screenshot of the current desktop.[176]

S0633 Sliver

Sliver can take screenshots of the victim’s active display.[177]

S0533 SLOTHFULMEDIA

SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it "Filter3.jpg", and stored it in the local directory.[178]

S0649 SMOKEDHAM

SMOKEDHAM can capture screenshots of the victim’s desktop.[179][180]

S0273 Socksbot

Socksbot can take screenshots.[181]

S0380