Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
4.C.11
|
|
|
Telemetry showed powershell.exe executing the NetUserGetLocalGroups API.
[1]
[2]
|
|
An MSSP detection for Discovery was generated containing evidence of PowerShell executing Invoke-NetUserGetLocalGroups.
[1]
[2]
[3]
[4]
|
|
Enumerated user's local group membership via the NetUserGetLocalGroups API
powershell.exe executing the NetUserGetLocalGroups API
[1]
[2]
Enumerated user's local group membership via the NetUserGetLocalGroups API
powershell.exe executing the NetUserGetLocalGroups API
[1]
[2]
[3]
[4]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.F.1
|
|
General Behavior
(Delayed)
|
A delayed General Behavior alert occurred due to a sequence of exploration activities that was classified as suspicious.
[1]
[2]
[3]
|
|
Telemetry showed the execution sequence of cmd.exe running net.exe with command-line arguments.
[1]
[2]
[3]
|
|
12.F.2
|
|
General Behavior
(Delayed)
|
A delayed General Behavior alert was generated for \"Suspicious sequence of exploration activities\".
[1]
[2]
[3]
|
|
Telemetry showed the execution sequence for powershell.exe executing net.exe with command-line arguments. The telemetry was tainted by a prior suspicious PowerShell cmdlet alert.
[1]
[2]
[3]
|
|
Cobalt Strike: 'net localgroup administrators' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net localgroup administrators' via cmd
[1]
[2]
[3]
Empire: 'Net Localgroup Administrators' via PowerShell
-
Alert is based on the correlation of a chain of related behaviors across multiple steps.
[1]
[2]
[3]
Empire: 'Net Localgroup Administrators' via PowerShell
[1]
[2]
[3]