Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
A Tactic detection named "Indirect process payload by office" (High) was generated when winword.exe spawned mshta.exe.
[1]
|
|
A Technique detection named "Suspicious mshta arguments" (Medium ) was generated when winword.exe spawned mshta.exe.
[1]
|
|
|
|
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
[1]
|
|
A Technique alert detection (medium severity) called "Rare DLL explicitly loaded by rundll32" was generated due to rundll32.exe executing kxwn.lock.
[1]
|
|
A Technique alert detection (medium severity) called "Rundll32 launching a DLL in the AppData directory" was generated due to rundll32.exe executing kxwn.lock.
[1]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1.2
|
|
|
A Specific Behavior alert was generated for rundll32.exe executing in a way typical for rundll32 injections.
[1]
|
|
A General Behavior alert was generated for an unusual call to rundll32.exe.
[1]
|
|
Telemetry showed rundll32.exe executing update.dat.
[1]
|
|
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
-
Screenshot is unavailable due to sensitivity of alert logic.
[1]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
-
Screenshot is unavailable due to sensitivity of alert logic.
[1]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]