Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
4.C.11
|
|
|
An MSSP detection for "Invoke-NetUserGetLocalGroups (psreflect)" occurred containing evidence of the NetUserGetLocalGroups API call.
[1]
|
|
Enumerated user's local group membership via the NetUserGetLocalGroups API
powershell.exe executing the NetUserGetLocalGroups API
[1]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.F.1
|
|
|
The capability enriched net.exe executing with the correct ATT&CK Tactic (Permission Groups Discovery) and Technique (Discovery). The data was tainted by a parent Injected Shellcode alert.
[1]
[2]
[3]
|
|
Telemetry showed cmd.exe executing net with command-line arguments.
[1]
[2]
[3]
|
|
12.F.2
|
|
General Behavior
(Tainted)
|
A General Behavior alert was generated for net.exe conducting suspicious activity related to Discovery/Privilege Escalation as well as being a descendant of a suspicious process. The alert was also tagged with the correct ATT&CK Tactic (Discovery) and Technique (Permission Groups Discovery). The alert was tainted by a parent PowerShell alert.
[1]
[2]
|
|
Telemetry showed net.exe executing with command-line arguments.
[1]
[2]
|
|
Cobalt Strike: 'net localgroup administrators' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net localgroup administrators' via cmd
[1]
[2]
[3]
Empire: 'Net Localgroup Administrators' via PowerShell
[1]
[2]
Empire: 'Net Localgroup Administrators' via PowerShell
-
For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.
[1]
[2]