Home >
Enterprise >
Participants >
GoSecure >
Lateral Movement (TA0008)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
5.A.7
![]() |
|
|||||
5.A.9
![]() |
Technique Lateral Tool Transfer (T1570) |
|
||||
5.A.10
![]() |
Technique Lateral Tool Transfer (T1570) |
|
||||
5.A.11
![]() |
Technique Lateral Tool Transfer (T1570) |
|
||||
5.B.1
![]() |
|
|||||
5.C.1
|
|
|||||
5.C.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||
5.C.4
|
Technique Lateral Tool Transfer (T1570) |
|
||||
7.A.5
|
|
|||||
7.B.3
|
|
|||||
16.A.5
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||
19.A.2
|
|
Criteria
SMB session from 10.0.1.5 to 10.0.1.6 over TCP port 135 or 445 with admin shares accessed
Data Sources
- Network Monitoring
- Process Monitoring
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
8.A.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
8.C.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||||
16.C.1
|
Technique Remote Services (T1021) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
16.D.1
|
Technique Lateral Tool Transfer (T1570) |
|
||||||
20.B.1
|
|
|||||||
20.B.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
6.C.1
|
|
|||||
10.B.1.2
|
|
|||||
16.A.1.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||
16.B.1.2
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||
16.D.1.1
|
Technique Remote Services (T1021) Subtechnique Remote Services: SMB/Windows Admin Shares (T1021.002) |
|
||||
16.G.1
|
Technique Lateral Tool Transfer (T1570) |
|
||||
20.A.1.2
|
|
Procedure
Cobalt Strike: C2 channel modified to proxy RDP connection to Conficker (10.0.0.5)
Footnotes
- At least one condition contributing to Enrichment was added to the capability's detection after the start of the evaluation, so this detection is identified as a configuration change. See Configuration page for details.


[2]


Procedure
RDP connection made to Conficker (10.0.0.5) as part of execution of persistence mechanism
Footnotes
- The conditions contributing to Enrichment were added to the capability's detection after the start of the evaluation, so this detection is identified as a configuration change. See Configuration page for details.


Procedure
Empire: Brute force password spraying attempts targeted Windows admin shares on Morris (10.0.1.4) and Nimda (10.0.1.6)
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.


[2]


[3]


[4]


Procedure
Empire: Built-in move capability executed to write malicious VBScript (update.vbs) to disk on Creeper (10.0.0.4)
Footnotes
- The condition contributing to enrichment may have been added to the capability's detection after the start of the evaluation, so the detection is identified as a configuration change. See Configuration page for details.

