Home >
Enterprise >
Participants >
Cybereason >
Event Triggered Execution (T1546)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
19.B.5
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
||||
20.A.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
3.B.1
|
|
|||||
14.A.1
|
|
|||||
15.A.2
|
|
|||||
20.A.2
|
|
Procedure
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Criteria
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
17.C.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Accessibility Features (T1546.008) |
|
||||
20.A.1.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Accessibility Features (T1546.008) |
|
Procedure
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]

