Home >
Enterprise >
Participants >
FireEye >
User Execution (T1204)
|
|
See technique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.1
|
Tactic Execution (TA0002) |
|
||||
11.A.1
|
Tactic Execution (TA0002) |
|
APT29 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
1.A.1
|
|
|||||||||
11.A.1
|
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.1.1
|
|
Procedure
Legitimate user Debbie clicked and executed malicious self-extracting archive (Resume Viewer.exe) on 10.0.1.6 (Nimda)
Footnotes
- The scan type used to produce this alert is On-access, which means the scan occurs on file writes and executions.
- The vendor reported that this file would have been quarantined and prevented from executing.


[2]

