Home >
Enterprise >
Participants >
CrowdStrike >
Event Triggered Execution (T1546)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
19.B.5
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
||||
20.A.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Application Shimming (T1546.011) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
3.B.1
|
|
|||||
14.A.1
|
|
|||||
15.A.2
|
|
|||||
20.A.2
|
|
Procedure
Established WMI event subscription persistence using PowerShell
Criteria
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
Footnotes
- All activity associated with an alert is grouped and correlated via the relevant detection tree.


[2]


APT3 |
||||||||
Step | ATT&CK Pattern |
|
||||||
17.C.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Accessibility Features (T1546.008) |
|
||||||
20.A.1.1
|
Tactic Persistence (TA0003) Subtechnique Event Triggered Execution: Accessibility Features (T1546.008) |
|
Procedure
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]

