Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1
|
|
|
|
Technique
(Configuration Change (Detection Logic))
|
A Technique detection named "User Execution of Office Related Application" (Informational) was generated when explorer.exe spawned winword.exe when the user clicks 1-list.rtf.
[1]
|
|
11.A.1
|
|
Technique
(Configuration Change (Detection Logic))
|
A Technique detection named "User Execution of Office Related Document" (Informational) was generated when explorer.exe spawned winword.exe when the user clicked 2-list.rtf.
[1]
|
|
|
|
explorer.exe spawns winword.exe when user clicks 1-list.rtf
[1]
explorer.exe spawns winword.exe when user clicks 1-list.rtf
-
New detection logic was applied for mapping specific techniques
[1]
explorer.exe spawns winword.exe when user clicks 2-list.rtf
-
new detection logic was applied for mapping specific techniques.
[1]
explorer.exe spawns winword.exe when user clicks 2-list.rtf
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1
|
|
|
An MSSP detection occurred for user Pam executing rcs.3aka3.doc.
[1]
|
|
A General alert detection (suspicious severity) was generated for rcs.3aka3.doc being a suspicious process.
[1]
|
|
Telemetry showed explorer.exe executing rcs.3aka3.doc.
[1]
|
|
11.A.1
|
|
|
An MSSP detection was generated containing evidence user Oscar executed 37486-the-shockingtruth-about-election-rigging-in-america.rtf.lnk.
[1]
|
|
Telemetry showed explorer.exe executing powershell.exe.
[1]
|
|
User Pam executed payload rcs.3aka3.doc
The rcs.3aka3.doc process spawning from explorer.exe
[1]
User Pam executed payload rcs.3aka3.doc
The rcs.3aka3.doc process spawning from explorer.exe
[1]
User Pam executed payload rcs.3aka3.doc
The rcs.3aka3.doc process spawning from explorer.exe
[1]
User Oscar executed payload 37486-the-shocking-truth-about-election-rigging-in-america.rtf.lnk
powershell.exe spawning from explorer.exe
[1]
User Oscar executed payload 37486-the-shocking-truth-about-election-rigging-in-america.rtf.lnk
powershell.exe spawning from explorer.exe
[1]