Home >
Enterprise >
Participants >
Malwarebytes >
Masquerading (T1036)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
11.A.6
|
|
|||||
17.A.2
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
1.A.2
|
|
|||
6.A.3
|
Tactic Defense Evasion (TA0005) Subtechnique Masquerading: Match Legitimate Name or Location (T1036.005) |
|
Procedure
Used unicode right-to-left override (RTLO) character to obfuscate file name rcs.3aka3.doc (originally cod.3aka.scr)
Criteria
Evidence of the right-to-left override character (U+202E) in the rcs.3aka.doc process OR the original filename (cod.3aka.scr)
Footnotes
- Updates to detections and logging were enabled after the start of the evaluation, so it is identified as a Detection Configuration Change.


Procedure
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Criteria
Evidence that accesschk.exe is not the legitimate Sysinternals tool
Footnotes
- Updates to detections and logging were enabled after the start of the evaluation, so it is identified as a Detection Configuration Change.

