Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
15.A.2
|
|
|
An MSSP detection for "WMI Event Subscription" was received that included a PowerShell command executed by the adversary and explained that it was used to establish persistence through a WMI Event Subscription that executes upon user logon.
[1]
|
|
A Technique detection called "WMI Event Subscriptionmodule WindowsParentalControlMigration contains suspicious argument" was generated on WMIProcessCreationEvent and WMIConsumerEvent being created in root/subscription.
[1]
|
|
A General alert detection called "SEP detected: CLDownloader!gen1" was generated on subscription:CommandLineEventConsumer.Name=WindowsParentalControlMigration.
[1]
|
|
20.A.2
|
|
|
Telemetry showed wmiprvse.exe executing PowerShell.
[1]
|
|
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
Executed WMI persistence on user login
The WMI process (wmiprvse.exe) executing powershell.exe
[1]