Home >
Enterprise >
Participants >
Cybereason >
User Execution (T1204)
|
|
See technique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
1.A.1
|
Tactic Execution (TA0002) |
|
||||
11.A.1
|
Tactic Execution (TA0002) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
1.A.1
|
|
|||||||
11.A.1
|
|
Procedure
User Oscar executed payload 37486-the-shocking-truth-about-election-rigging-in-america.rtf.lnk
Criteria
powershell.exe spawning from explorer.exe
APT3 |
||||||||
Step | ATT&CK Pattern |
|
||||||
1.A.1.1
|
|
Procedure
Legitimate user Debbie clicked and executed malicious self-extracting archive (Resume Viewer.exe) on 10.0.1.6 (Nimda)
Footnotes
- The provided screenshot was captured later in the evaluation and includes additional information appended to explorer.exe not relevant to this procedure.


[2]


[3]

