Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
|
|
A Technique detection named "Powershell user discovery command used" was generated when PowerShell executed Get-NetUser.
[1]
[2]
|
|
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
PowerShell executes Get-NetUser
-
Script Logs
-
Process Monitoring
[1]
[2]
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.G.1
|
|
|
The capability enriched the execution of net.exe as the execution of an enumeration command. The data was tainted by a parent alert related to Resume Viewer.exe and suspicious execution of the Windows Scripting Engine.
[1]
[2]
|
|
Telemetry showed cmd.exe executing net with command-line arguments. The telemetry was tainted by a parent alert related to Resume Viewer.exe and suspicious execution of the Windows Scripting Engine.
[1]
[2]
|
|
2.G.2
|
|
|
The capability enriched net1.exe executing with the correct ATT&CK Technique (Account Discovery).
[1]
[2]
[3]
|
|
The capability enriched the execution of net.exe as the execution of an enumeration command. The data was tainted by a parent alert related to Resume Viewer.exe and suspicious execution of the Windows Scripting Engine.
[1]
[2]
[3]
|
|
Telemetry showed cmd.exe executing net with command-line arguments. The telemetry was tainted by a parent alert related to Resume Viewer.exe and suspicious execution of the Windows Scripting Engine.
[1]
[2]
[3]
|
|
12.G.2
|
|
|
The capability enriched net.exe executing with command-line arguments with the correct ATT&CK Technique (Account Discovery).
[1]
[2]
|
|
Telemetry showed powershell.exe executing net with command-line arguments. The telemetry was tainted by a parent alert on wscript.exe.
[1]
[2]
|
|
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
[3]
Empire: 'net user -domain' via PowerShell
[1]
[2]
Empire: 'net user -domain' via PowerShell
[1]
[2]