Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
|
Tactic
(Configuration Change (Detection Logic))
|
A Tactic detection named "Information Discovery via Powershell" (Low) was generated when PowerShell executed Get-NetUser.
[1]
|
|
PowerShell executes Get-NetUser
-
Script Logs
-
Process Monitoring
[1]
[2]
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
APT29
|
The technique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.G.1
|
|
General Behavior
(Configuration Change, Tainted, Delayed)
|
A delayed General Behavior alert triggered for a specified number of discovery techniques over a specified time period, which resulted in four Enumeration Command Sequence alerts for Step 2 (tainted by a parent Malicious File Detection).
[1]
[2]
[3]
|
|
Telemetry within the event tree showed cmd.exe executing net.exe with command-line arguments (tainted by a parent Malicious File Detection).
[1]
[2]
[3]
|
|
2.G.2
|
|
General Behavior
(Delayed, Configuration Change, Tainted)
|
A delayed General Behavior alert triggered for a specified number of discovery techniques over a specified time period, which resulted in four Enumeration Command Sequence alerts for Step 2 (tainted by a parent Malicious File Detection).
[1]
[2]
[3]
|
|
Telemetry within the event tree showed cmd.exe executing net.exe with command-line arguments (tainted by a parent Malicious File Detection).
[1]
[2]
[3]
|
|
7.A.1.3
|
|
|
Telemetry showed execution of mmc.exe, the Microsoft Management Console, spawning the lusrmgr.msc (Local Users and Groups snap-in) which displays local account information.
[1]
|
|
12.G.1
|
|
Enrichment
(Delayed, Tainted)
|
The capability enriched the event with the correct ATT&CK Technique (T1087 - Account Discovery) and Tactic (Discovery). The enrichment was tainted by parent PowerShell alerts.
[1]
[2]
|
|
Telemetry showed net.exe executing with command-line arguments (tainted by parent PowerShell alerts).
[1]
[2]
|
|
12.G.2
|
|
Enrichment
(Tainted, Delayed)
|
The capability enriched the event with the correct ATT&CK Technique (T1087 - Account Discovery) and Tactic (Discovery). The enrichment was tainted by parent PowerShell alerts.
[1]
|
|
Telemetry showed net.exe executing with command-line arguments (tainted by parent PowerShell alerts).
[1]
|
|
Cobalt Strike: 'net user -domain' via cmd
-
This alert was configured after the start of the evaluation so is identified as a configuration change.
[1]
[2]
[3]
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net user george -domain' via cmd
-
This alert was configured after the start of the evaluation so is identified as a configuration change.
[1]
[2]
[3]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
[3]
Microsoft Management Console (Local Users and Groups snap-in) GUI utility displayed user account information
[1]
Empire: 'net user' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]
[2]
Empire: 'net user' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]
[2]
Empire: 'net user -domain' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]
Empire: 'net user -domain' via PowerShell
-
Telemetry is immediately available within the event tree and then can be enriched with ATT&CK Techniques and Tactics, so this is counted as two detections.
[1]