Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
|
|
A Technique alert detection (low severity) called "Win_Rundll32_Usage_MitreT1085" was generated due to Rundll32 executing a DLL.
[1]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
-
Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]