Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.A.2
|
|
|
A Technique detection named "Masquerading (T1036) | Match Legitimate Name or Location (T1036.005)" was generated when SystemPropertiesAdvanced.exe loaded a malicious module from a system folder.
[1]
|
|
|
|
srrstr.dll is not the legitimate Windows System Protection Configuration Library
-
File Monitoring
-
Process Monitoring
-
DLL Monitoring
-
Marked as delayed due to detection occurring after execution, not file create.
[1]
srrstr.dll is not the legitimate Windows System Protection Configuration Library
-
File Monitoring
-
Process Monitoring
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
General
(Alert, Correlated)
|
A General alert detection (red indicator) was generated for accesschk.exe being an unsigned file with a known signed version. The detection was correlated to a parent alert for malicious PowerShell.
[1]
|
|
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
[1]
APT3
|
The subtechnique was not in scope.
|