Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
4.C.7
|
|
|
Telemetry showed powershell.exe executing $Gwmi WmiObject ... -Class AntiVirusProduct. The event was correlated to a parent General detection for malicious file execution.
[1]
|
Tactic
(Correlated, Alert)
|
A Tactic detection called "Reconnaissance of Multiple WMI Classes" was generated due to multiple WMI classes being executed in quick succession. The event was correlated to a parent General detection for malicious file execution. The detection was a medium severity alert.
[1]
|
|
4.C.8
|
|
|
Telemetry showed powershell.exe executing $Gwmi WmiObject ... -Class FireWallProduct. The event was correlated to a parent General detection for malicious file execution.
[1]
|
Tactic
(Correlated, Alert)
|
A Tactic detection called "Reconnaissance of Multiple WMI Classes" was generated due to multiple WMI classes being executed in quick succession. The event was correlated to a parent General detection for malicious file execution. The detection was a medium severity alert.
[1]
|
|
12.B.1
|
|
|
Telemetry showed PowerShell gwmi query for AntiVirusProduct. The event was correlated to a parent General detection for a suspicious Windows script.
[1]
|
Technique
(Configuration Change (Detections), Correlated, Alert)
|
A Technique detection (medium severity) for "ATT&CK T1063 Security Software Discovery" was generated due to PowerShell executing the detectav function. The event was correlated to a parent General detection for a suspicious Windows script.
[1]
|
|
Enumerated anti-virus software using PowerShell
powershell.exe executing Get-WmiObject ... -Class AntiVirusProduct
[1]
Enumerated anti-virus software using PowerShell
powershell.exe executing Get-WmiObject ... -Class AntiVirusProduct
[1]
Enumerated firewall software using PowerShell
powershell.exe executing Get-WmiObject ... -Class FireWallProduct
[1]
Enumerated firewall software using PowerShell
powershell.exe executing Get-WmiObject ... -Class FireWallProduct
[1]
Enumerated registered AV products using PowerShell
powershell.exe executing a Get-WmiObject query for AntiVirusProduct
[1]
Enumerated registered AV products using PowerShell
powershell.exe executing a Get-WmiObject query for AntiVirusProduct
[1]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
12.E.1.10.1
|
|
|
Minimum detection criteria was not met for this procedure.
[1]
|
|
12.E.1.10.2
|
|
|
Minimum detection criteria was not met for this procedure.
[1]
|
|
Empire: WinEnum module included enumeration of AV solutions
-
Interactive Shell was not by itself considered telemetry, but the analyst can retrieve additional Windows Logs to enhance baseline Endgame functionality.
[1]
Empire: WinEnum module included enumeration of firewall rules
-
Interactive Shell was not by itself considered telemetry, but the analyst can retrieve additional Windows Logs to enhance baseline Endgame functionality.
[1]