Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.C.1
|
|
|
A Specific Behavior alert was generated for the modification of an accessibility features binary known to be used for privilege escalation.
[1]
[2]
|
|
The capability enriched cmd.exe as being renamed to another process and with a relevant ATT&CK Technique (Masquerading).
[1]
[2]
|
|
Telemetry showed powershell.exe overwriting magnify.exe with cmd.exe via the copy command.
[1]
[2]
|
|
20.A.1.1
|
|
|
A General Behavior alert was generated for magnify.exe executing as a process with a renamed executable.
[1]
[2]
[3]
|
|
The capability enriched utilman.exe executing magnify.exe with a tag indicating that magnify was a persistent backdoor.
[1]
[2]
[3]
|
|
Telemetry showed magnify.exe executing from utilman.exe with the original file name of cmd.exe.
[1]
[2]
[3]
|
|
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
-
Screenshot is not available due to sensitivity of rule logic.
[1]
[2]
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
[3]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
[3]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
[3]