APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
A Technique alert detection (yellow, medium severity) called Rundll32 Execution was generated due to rundll32.exe executing kxwn.lock.
[1]
|
|
An MSSP detection contained evidence of rundll32.exe executing kxwn.lock.
[1]
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
[1]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]