Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
15.A.2
|
|
|
A Technique alert detection (medium severity) for Windows Management Instrumentation Event Subscription was generated due to a WMI event filter being bound to a suspicious event consumer.
[1]
|
|
Telemetry showed the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription. Script preview was truncated so an alternate view is shown.
[1]
[2]
|
|
An MSSP detection for Persistence was generated containing evidence PowerShell commands were executed to use WMI to subscribe to the WindowsParentalControlMigration scheduled task start event for user 'Oscar'.
[1]
[2]
|
|
20.A.2
|
|
|
Telemetry showed wmiprvse.exe executing the PowerShell stager.
[1]
|
|
An MSSP detection for execution was generated containing evidence of the execution of malicious staging payload via WMI persistence, triggered by the logon of user Oscar.
[1]
[2]
|
|
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
Executed WMI persistence on user login
The WMI process (wmiprvse.exe) executing powershell.exe
-
This activity would have been blocked by Microsoft Defender configured with Attack Surface Reduction.
[1]
Executed WMI persistence on user login
The WMI process (wmiprvse.exe) executing powershell.exe
[1]
[2]
APT3
|
The subtechnique was not in scope.
|