Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
|
|
A Technique detection named "JavaScript or VBScript Command Execution Via Mshta.exe" (High) was generated when mshta.exe executed the embedded VBScript payload.
[1]
|
|
A General detection named "MS Office Application Command Execution Via DDE" (Low) was generated when winword.exe spawned mshta.exe.
[1]
|
|
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
-
Additional DDE Context can be found at https://docs.microsoft.com/en-us/windows/win32/dataxchg/about-dynamic-data-exchange
[1]
APT29
|
The subtechnique was not in scope.
|