Home >
Enterprise >
Participants >
FireEye >
Deobfuscate/Decode Files or Information (T1140)
|
|
Carbanak+FIN7 |
||||||||
Step | ATT&CK Pattern |
|
||||||
1.A.5
|
Tactic Defense Evasion (TA0005) |
|
||||||
1.A.6
|
Tactic Defense Evasion (TA0005) |
|
||||||
3.B.5
|
Tactic Defense Evasion (TA0005) |
|
||||||
5.C.6
|
Tactic Defense Evasion (TA0005) |
|
||||||
11.A.5
|
Tactic Defense Evasion (TA0005) |
|
||||||
14.A.3
|
Tactic Defense Evasion (TA0005) |
|
||||||
14.A.5
|
Tactic Defense Evasion (TA0005) |
|
APT29 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
4.A.3
|
Tactic Defense Evasion (TA0005) |
|
||||||||
11.A.10
|
Tactic Defense Evasion (TA0005) |
|
||||||||
14.B.6
|
Tactic Defense Evasion (TA0005) |
|
Procedure
Decoded an embedded DLL payload to disk using certutil.exe
Criteria
certutil.exe decoding kxwn.lock
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
APT3 |
||
The technique was not in scope. |