Home >
Enterprise >
Participants >
Bitdefender >
Persistence (TA0003)
|
|
Carbanak+FIN7 |
||||||||||||
Step | ATT&CK Pattern |
|
||||||||||
4.A.4
|
|
|||||||||||
5.A.8
![]() |
|
|||||||||||
5.B.2
![]() |
|
|||||||||||
7.B.2
|
|
|||||||||||
7.C.4
|
|
|||||||||||
10.A.4
|
|
|||||||||||
16.A.4
|
|
|||||||||||
19.A.1
|
|
|||||||||||
19.B.5
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
||||||||||
20.A.1
|
Technique Event Triggered Execution (T1546) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
APT29 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
5.A.1
|
|
|||||||||
5.B.1
|
|
|||||||||
10.B.1
|
|
|||||||||
11.A.11
|
|
|||||||||
15.A.2
|
|
|||||||||
20.A.2
|
|
|||||||||
20.B.3
|
|
Procedure
Created a new service (javamtsup) that executes a service binary (javamtsup.exe) at system startup
Criteria
powershell.exe creating the Javamtsup service
Footnotes
- The logic for this detection was enabled after the start of the evaluation so the detection is identified as a Detection Configuration Change.


Procedure
Executed LNK payload (hostui.lnk) in Startup Folder on user login
Criteria
Evidence that the file hostui.lnk (which executes hostui.bat as a byproduct) was executed from the Startup Folder
Procedure
Established Registry Run key persistence using PowerShell
Criteria
Addition of the Webcache subkey in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
Procedure
Executed WMI persistence on user login
Criteria
The WMI process (wmiprvse.exe) executing powershell.exe
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.