Carbanak+FIN7
|
The technique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.5
|
|
|
Telemetry showed the PowerShell gwmi query for Win32_PnPEntity.
[1]
|
|
An MSSP detection for Discovery was generated containing evidence PowerShell ran commands to pull properties of Plug and Play devices: gwmi -namespace root\cimv2 -query 'SELECT * FROM Win32_PnPEntity'.
[1]
[2]
[3]
|
|
Enumerated devices/adapters to check for presence of VirtualBox driver(s) using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_PnPEntity
[1]
Enumerated devices/adapters to check for presence of VirtualBox driver(s) using PowerShell
powershell.exe executing a Get-WmiObject query for Win32_PnPEntity
[1]
[2]
[3]
APT3
|
The technique was not in scope.
|