Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
[1]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1.2
|
|
Specific Behavior
(Tainted)
|
A Specific Behavior alert was generated for injected shellcode by a compromised legitimate process (rundll32.exe). The alert was tagged with the correct ATT&CK Tactic (Defense Evasion) and a related Technique (Process Injection) and was tainted by parent alert on rundll32.exe injection.
[1]
[2]
[3]
|
Specific Behavior
(Tainted)
|
A Specific Behavior alert was generated for rundll32.exe launching a module in a temporary folder and injecting shell code into a victim process. The alert was tainted by a parent alert on explorer.exe attempting to execute a file (Resume Viewer.exe) identified as malicious.
[1]
[2]
[3]
|
|
Telemetry within the rundll32.exe injection alert also showed full command-line arguments of rundll32.exe executing update.dat. The telemetry was tainted by a parent alert on explorer.exe attempting to execute a file (Resume Viewer.exe) identified as malicious.
[1]
[2]
[3]
|
|
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]
[2]
[3]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]
[2]
[3]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
-
For most alerts in the user interface, the telemetry behind it is separately available in the capability and counted as a separate detection.
[1]
[2]
[3]