Home >
Enterprise >
Participants >
AhnLab >
Defense Evasion (TA0005)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.4
|
Technique Obfuscated Files or Information (T1027) |
|
||||
1.A.5
|
|
|||||
1.A.6
|
|
|||||
3.A.2
|
Technique Modify Registry (T1112) |
|
||||
3.A.3
|
Technique Obfuscated Files or Information (T1027) |
|
||||
3.B.5
|
|
|||||
4.B.4
|
Technique Modify Registry (T1112) |
|
||||
5.C.6
|
|
|||||
7.A.4
|
|
|||||
9.A.3
|
Technique Process Injection (T1055) |
|
||||
9.B.3
|
Technique Indicator Removal on Host (T1070) Subtechnique Indicator Removal on Host: File Deletion (T1070.004) |
|
||||
10.A.3
|
Technique Impair Defenses (T1562) Subtechnique Impair Defenses: Disable or Modify System Firewall (T1562.004) |
|
||||
10.A.5
|
Technique Modify Registry (T1112) |
|
||||
10.A.6
|
Technique Modify Registry (T1112) |
|
||||
11.A.2
|
Technique Obfuscated Files or Information (T1027) |
|
||||
11.A.5
|
|
|||||
11.A.6
|
|
|||||
13.A.4
|
Technique Virtualization/Sandbox Evasion (T1497) Subtechnique Virtualization/Sandbox Evasion: System Checks (T1497.001) |
|
||||
14.A.3
|
|
|||||
14.A.5
|
|
|||||
16.A.7
|
|
|||||
17.A.2
|
Technique Masquerading (T1036) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
||||
18.A.1
|
Technique Process Injection (T1055) |
|
||||
18.A.3
|
Technique Process Injection (T1055) |
|
||||
19.B.2
|
Technique Obfuscated Files or Information (T1027) |
|
||||
20.A.2
|
Technique Process Injection (T1055) |
|
Criteria
powershell.exe decrypts, decompresses, and base64 decodes the Registry value into plaintext shellcode