Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.A.2
|
|
Technique
(Configuration Change (Detection Logic))
|
A Technique detection named "Possible DLL Highjacking Attempt" was generated when srrstr.dll was written to a suspicious folder.
[1]
|
|
|
|
srrstr.dll is not the legitimate Windows System Protection Configuration Library
[1]
srrstr.dll is not the legitimate Windows System Protection Configuration Library
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
Telemetry showed hash of accesschk.exe which can be used to verify it is not the legitimate Sysinternals tool.
[1]
[2]
|
Technique
(Configuration Change (Detections), Alert)
|
A Technique alert detection called "Sysinternals Masquerade" was generated due to the process accesschk.exe executing without accepting the EULA.
[1]
|
|
An MSSP detection occurred indicating that accesschk.exe is not the legitimate Sysinternals tool.
[1]
|
|
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
[1]
[2]
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
-
The logic for this detection was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.
[1]
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
[1]
APT3
|
The subtechnique was not in scope.
|