APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.2
|
|
|
Telemetry showed powershell.exe executing the schemas ADS with Get-Content and IEX.
[1]
|
|
An MSSP detection for "Defense Evasion - NTFS File Attributes" occurred containing evidence of PowerShell executing schemas ADS via Get-Content and IEX.
[1]
[2]
[3]
|
|
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
[2]
[3]