Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.2
|
|
|
A Technique detection named "Possible Abusive Module Load" (Informational) was generated when winword.exe loaded VBE7.DLL.
[1]
[2]
|
|
A Technique detection named "Office process loads scripting related DLLs " (Informational) was generated when winword.exe loaded VBE7.DLL.
[1]
[2]
|
|
|
|
11.A.7
|
|
|
|
|
A Technique detection named "Inter-Process Communication" (Low) was generated when winword.exe spawned verclsid.exe and loads VBE7.DLL, VBEUI.DLL, and VBE7INTL.DLL.
[1]
|
|
winword.exe loads VBE7.DLL
-
Process Monitoring
-
DLL Monitoring
[1]
[2]
winword.exe loads VBE7.DLL
-
DLL Monitoring
-
Process Monitoring
[1]
[2]
winword.exe loads VBE7.DLL
-
DLL Monitoring
-
Process Monitoring
[1]
winword.exe spawns verclsid.exe and loads VBE7.DLL, VBEUI.DLL, and VBE7INTL.DLL
-
Process Monitoring
-
DLL Monitoring
[1]
winword.exe spawns verclsid.exe and loads VBE7.DLL, VBEUI.DLL, and VBE7INTL.DLL
-
DLL Monitoring
-
Process Monitoring
[1]
APT29
|
The subtechnique was not in scope.
|
APT3
|
The subtechnique was not in scope.
|