Home >
Enterprise >
Participants >
CrowdStrike >
Defense Evasion (TA0005)
|
|
Carbanak+FIN7 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
1.A.4
|
Technique Obfuscated Files or Information (T1027) |
|
||||||||
1.A.5
|
|
|||||||||
1.A.6
|
|
|||||||||
3.A.2
|
Technique Modify Registry (T1112) |
|
||||||||
3.A.3
|
Technique Obfuscated Files or Information (T1027) |
|
||||||||
3.B.5
|
|
|||||||||
4.B.4
|
Technique Modify Registry (T1112) |
|
||||||||
5.C.6
|
|
|||||||||
7.A.4
|
|
|||||||||
9.A.3
|
Technique Process Injection (T1055) |
|
||||||||
9.B.3
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||||||
10.A.3
|
Technique Impair Defenses (T1562) Subtechnique Impair Defenses: Disable or Modify System Firewall (T1562.004) |
|
||||||||
10.A.5
|
Technique Modify Registry (T1112) |
|
||||||||
10.A.6
|
Technique Modify Registry (T1112) |
|
||||||||
11.A.2
|
Technique Obfuscated Files or Information (T1027) |
|
||||||||
11.A.5
|
|
|||||||||
11.A.6
|
|
|||||||||
13.A.4
|
Technique Virtualization/Sandbox Evasion (T1497) Subtechnique Virtualization/Sandbox Evasion: System Checks (T1497.001) |
|
||||||||
14.A.3
|
|
|||||||||
14.A.5
|
|
|||||||||
16.A.7
|
|
|||||||||
17.A.2
|
Technique Masquerading (T1036) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
||||||||
18.A.1
|
Technique Process Injection (T1055) |
|
||||||||
18.A.3
|
Technique Process Injection (T1055) |
|
||||||||
19.B.2
|
Technique Obfuscated Files or Information (T1027) |
|
||||||||
20.A.2
|
Technique Process Injection (T1055) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.2
|
|
|||||
3.A.2
|
|
|||||
3.C.1
|
Technique Modify Registry (T1112) |
|
||||
4.A.3
|
|
|||||
4.B.2
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
4.B.3
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
4.B.4
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
6.A.3
|
Technique Masquerading (T1036) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
||||
8.B.2
|
|
|||||
8.C.1
|
|
|||||
9.C.1
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
9.C.2
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
9.C.3
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
9.C.4
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
10.B.3
|
|
|||||
11.A.2
|
|
|||||
11.A.3
|
Technique Virtualization/Sandbox Evasion (T1497) Subtechnique Virtualization/Sandbox Evasion: System Checks (T1497.001) |
|
||||
11.A.10
|
|
|||||
12.A.2
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: Timestomp (T1070.006) |
|
||||
14.A.3
|
Technique Modify Registry (T1112) |
|
||||
14.B.5
|
Technique Obfuscated Files or Information (T1027) |
|
||||
14.B.6
|
|
|||||
17.C.2
|
Technique Obfuscated Files or Information (T1027) |
|
Procedure
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
Criteria
powershell.exe executing a Get-WmiObject query for Win32_BIOS
Footnotes
- PowerShell script block content for this step was collected on sensor, but at execution time did not meet confidence threshold to be sent to cloud for further analysis.
APT3 |
||||||||
Step | ATT&CK Pattern |
|
||||||
3.A.1.2
|
|
|||||||
5.B.1
|
|
|||||||
16.C.1
|
|
|||||||
16.I.1.2
|
|
|||||||
17.B.1
|
|
|||||||
17.B.2
|
|
|||||||
19.A.1.1
|
Technique Masquerading (T1036) |
|
||||||
19.B.1.3
|
Technique Masquerading (T1036) |
|
||||||
19.D.1
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||||
19.D.2
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
Procedure
Cobalt Strike: Built-in UAC bypass token duplication capability executed to modify current process token
Procedure
Empire: Executed binary (recycler.exe) is a renamed copy of the WinRAR binary
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]

