Home >
Enterprise >
Participants >
ReaQta >
Persistence (TA0003)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.A.4
|
|
|||||
5.A.8
![]() |
|
|||||
5.B.2
![]() |
|
|||||
7.B.2
|
|
|||||
7.C.4
|
|
|||||
10.A.4
|
|
|||||
16.A.4
|
|
|||||
19.A.1
|
|
|||||
19.B.5
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
||||
20.A.1
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
5.A.1
|
|
|||||||
5.B.1
|
|
|||||||
10.B.1
|
|
|||||||
11.A.11
|
|
|||||||
15.A.2
|
|
|||||||
20.A.2
|
|
|||||||
20.B.3
|
|
Procedure
Executed LNK payload (hostui.lnk) in Startup Folder on user login
Criteria
Evidence that the file hostui.lnk (which executes hostui.bat as a byproduct) was executed from the Startup Folder
Procedure
Established Registry Run key persistence using PowerShell
Criteria
Addition of the Webcache subkey in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Established WMI event subscription persistence using PowerShell
Criteria
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Established WMI event subscription persistence using PowerShell
Criteria
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Established WMI event subscription persistence using PowerShell
Criteria
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
Footnotes
- PowerShell script block logging was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.

