Home >
Enterprise >
Participants >
CyCraft >
Persistence (TA0003)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.4
|
|
|||||
5.A.8
![]() |
|
|||||
5.B.2
![]() |
|
|||||
7.B.2
|
|
|||||
7.C.4
|
|
|||||
10.A.4
|
|
|||||
16.A.4
|
|
|||||
19.A.1
|
|
|||||
19.B.5
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
||||
20.A.1
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
5.A.1
|
|
|||||||
5.B.1
|
|
|||||||
10.B.1
|
|
|||||||
11.A.11
|
|
|||||||
15.A.2
|
|
|||||||
20.A.2
|
|
|||||||
20.B.3
|
|
Procedure
Created a LNK file (hostui.lnk) in the Startup folder that executes on login
Criteria
powershell.exe creating the file hostui.lnk in the Startup folder
Footnotes
- MSSP analysis that was performed on Windows Event Logs (Event ID 4104, PowerShell ScriptBlock Logs) would have been requested during a normal engagement when CyCraft MDR received insufficient information for analysis of adversary activity.


[2]


Procedure
Executed LNK payload (hostui.lnk) in Startup Folder on user login
Criteria
Evidence that the file hostui.lnk (which executes hostui.bat as a byproduct) was executed from the Startup Folder