Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
|
|
A General detection named "Powerview cmdlet usage" (High) was generated when PowerShell executed Get-NetUser.
[1]
|
|
A Tactic detection named "Recon by powershell" (High) was generated when PowerShell executed Get-NetUser.
[1]
|
|
A General detection named "Known powershell attack tool" (High ) was generated when PowerShell executed Get-NetUser.
[1]
|
|
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
[2]
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
PowerShell executes Get-NetUser
-
Script Logs
-
Process Monitoring
[1]
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.G.1
|
|
|
A General Behavior alert was generated for rundll32.exe launching cmd.exe (executing the net) which was identified as extremely rare and suspicious.
[1]
[2]
|
|
The capability enriched net.exe with a tag identifying the command as enumeration.
[1]
[2]
|
|
2.G.2
|
|
|
A General Behavior alert was generated showing that a spawned process (net) has been tagged for monitoring because its parent process has a detection (cmd.exe).
[1]
[2]
|
|
The capability enriched net.exe with a tag identifying the command as enumeration.
[1]
[2]
|
|
12.G.2
|
|
|
A General Behavior alert was generated showing that a spawned process (net.exe) has been tagged for monitoring because its parent process has a detection (powershell.exe).
[1]
[2]
|
|
Telemetry showed powershell.exe executing net.exe with command-line arguments.
[1]
[2]
|
|
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
Cobalt Strike: 'net user george -domain' via cmd
[1]
[2]
Empire: 'net user -domain' via PowerShell
[1]
[2]
Empire: 'net user -domain' via PowerShell
[1]
[2]