Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
A Technique detection named "ProcessLaunchFromShortcut - T1218.005 Mshta" (Low) was generated when unprotected.lnk launched mshta.exe.
[1]
[2]
|
|
|
|
A Technique detection named "Microsoft Office Suspicious Child - T1218.005 Mshta" was generated when winword.exe spawned mshta.exe.
[1]
|
|
A General detection named "Antimalware detected mshta.exe executed a suspicious command line " (High) was generated when winword.exe spawned mshta.exe.
[1]
|
|
winword.exe spawns mshta.exe
-
Process Monitoring
-
File Monitoring
[1]
[2]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
-
Process Monitoring
-
File Monitoring
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
A Technique alert detection was generated for "rundll32uncommonload" due to rundll32.exe executing kxwn.lock.
[1]
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
-
Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.