Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
13.A.4
|
|
|
|
|
A Technique detection named "process performed Virtualization/Sandbox Evasion" was generated when a WMI query was made for Win32_BIOS.
[1]
|
|
Adb156.exe makes a WMI query for Win32_BIOS
-
WMI Objects
-
Process Monitoring
-
Parent process name was presented instead of initiating process name
[1]
Adb156.exe makes a WMI query for Win32_BIOS
-
Process Monitoring
-
WMI Objects
-
Parent process name was presented instead of initiating process name
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
Telemetry showed the PowerShell gwmi query for Win32_BIOS.
[1]
|
|
An MSSP detection for Discovery was generated containing evidence PowerShell ran command to check BIOS version and serial numbers gwmi -namespace root\cimv2 -query 'SELECT * FROM Win32_BIOS'.
[1]
[2]
[3]
|
|
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_BIOS
[1]
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_BIOS
[1]
[2]
[3]
APT3
|
The subtechnique was not in scope.
|