Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
3.B.1
|
|
General
(Correlated, Alert)
|
A General alert detection was generated identifying the Registry modification as a malware behavior threat. The detection was correlated to a parent alert for the rcs.3aka3.doc screensaver process executing from users or temporary folder.
[1]
[2]
|
|
An MSSP detection occurred containing evidence of addition of DelegateExecute subkey.
[1]
[2]
|
|
Telemetry showed the addition of the DelegateExecute Registry Value. The detection was correlated to a parent alert for the rcs.3aka3.doc screensaver process executing from users or temporary folder.
[1]
|
|
14.A.1
|
|
|
Telemetry showed the addition of the DelegateExecute Registry value. The detection was correlated to a parent alert for a suspicious Powershell process being spawned by explorer.exe.
[1]
[2]
|
|
An MSSP detection occurred containing evidence of the addition of DelegateExecute subkey.
[1]
|
|
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
[2]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
[2]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
[2]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
APT3
|
The subtechnique was not in scope.
|