Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.C.1
|
|
|
A Specific Behavior alert was generated for overwrite of magnify.exe indicating a sticky keys binary hijack for persistence was detected.
[1]
[2]
[3]
|
|
Telemetry showed powershell.exe overwriting magnify.exe with the new file containing the same hash for cmd.exe. Reputation metadata confirms magnify.exe is cmd.exe under the file names observed.
[1]
[2]
[3]
|
|
20.A.1.1
|
|
|
A Specific Behavior alert was generated on a successful sticky keys binary hijack because magnify.exe was executing as cmd.exe.
[1]
[2]
|
|
Telemetry showed execution of magnify.exe from utilman.exe.
[1]
[2]
|
|
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
[3]
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
[3]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]