Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
7.A.1.3
|
|
|
Telemetry showed execution of mmc.exe, the Microsoft Management Console, spawning the lusrmgr.msc (Local Users and Groups snap-in) which displays local account information.
[1]
|
|
12.G.1
|
|
Enrichment
(Delayed, Tainted)
|
The capability enriched the event with the correct ATT&CK Technique (T1087 - Account Discovery) and Tactic (Discovery). The enrichment was tainted by parent PowerShell alerts.
[1]
[2]
|
|
Telemetry showed net.exe executing with command-line arguments (tainted by parent PowerShell alerts).
[1]
[2]
|
|
Microsoft Management Console (Local Users and Groups snap-in) GUI utility displayed user account information
[1]
Empire: 'net user' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]
[2]
Empire: 'net user' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]
[2]