Carbanak+FIN7
|
The technique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
18.A.1
|
|
Telemetry
(Delayed (Manual))
|
Telemetry showed net.exe with command-line arguments to connect to a OneDrive URL as well as net.exe subsequently making a network connection to public IPs over port 443.
[1]
[2]
[3]
|
|
An MSSP detection for "Web Service" was received that included a PowerShell command executed by the adversary and explained that it was used to exfiltrate locally staged data to a remote WebDav share.
[1]
|
|
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
-
The telemetry was acquired by manually initiating an export of endpoint-stored event data that was not automatically sent to the analysis system, which caused this detection to receive Delayed (Manual).
[1]
[2]
[3]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]