Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
5.C.1
|
|
|
A General detection named "Credential Access" (9/10) was generated when psexec.py created a logon to 10.0.0.4 as user kmitnick.
[1]
|
|
|
|
psexec.py creates a logon to 10.0.0.4 as user kmitnick
[1]
psexec.py creates a logon to 10.0.0.4 as user kmitnick
-
Windows Event Logs
-
Process Monitoring
-
Network Monitoring
[1]
[2]
[3]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.B.1
|
|
|
Telemetry showed the contents of the Invoke-Mimikatz script along with PowerShell executing Invoke-Mimikatz to create and inject a golden ticket into the current session. The detection was correlated to a parent alert for Windows Management Instrumentation.
[1]
[2]
|
|
An MSSP detection occurred containing evidence of PowerShell executing Invoke-Mimikatz to create and inject a golden ticket into the current session.
[1]
|
|
A General alert detection (red indicator) was generated for a Credential Theft Application Running.
[1]
|
|
A General alert detection (red indicator) was generated for PowerShell running Mimikatz.
[1]
|
|
Created Kerberos Golden Ticket using Invoke-Mimikatz
powershell.exe executing Invoke-Mimikatz with command-line arguments to create a golden ticket
[1]
[2]
Created Kerberos Golden Ticket using Invoke-Mimikatz
powershell.exe executing Invoke-Mimikatz with command-line arguments to create a golden ticket
[1]
Created Kerberos Golden Ticket using Invoke-Mimikatz
powershell.exe executing Invoke-Mimikatz with command-line arguments to create a golden ticket
[1]
Created Kerberos Golden Ticket using Invoke-Mimikatz
powershell.exe executing Invoke-Mimikatz with command-line arguments to create a golden ticket
[1]
APT3
|
The technique was not in scope.
|