Home >
Enterprise >
Participants >
CrowdStrike >
Command and Scripting Interpreter: Visual Basic (T1059.005)
|
|
See subtechnique results for:
Carbanak+FIN7 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
1.A.3
|
|
|||||||||
1.A.7
|
|
|||||||||
8.A.1
|
|
|||||||||
11.A.4
|
|
APT29 |
||
The subtechnique was not in scope. |
APT3 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
11.A.1
|
|
Procedure
Legitimate user Bob clicked and executed malicious VBScript (autoupdate.vbs) on 10.0.1.5 (CodeRed)
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]

