Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.A.2
|
|
Technique
(Configuration Change (Detection Logic))
|
A Technique detection named "DllHijackSyswow - T1036.005 Masquerading: Match Legitimate Name or Location" (Low) was generated when srrstr.dll was written to disk.
[1]
[2]
|
|
A Technique detection named "Antimalware static engines identified a potential security breach - T1035 Masquerading" (High) was generated when srrstr.dll was detected as not legitimate .
[1]
|
|
|
|
srrstr.dll is not the legitimate Windows System Protection Configuration Library
-
File Monitoring
-
Process Monitoring
[1]
[2]
srrstr.dll is not the legitimate Windows System Protection Configuration Library
[1]
srrstr.dll is not the legitimate Windows System Protection Configuration Library
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
Telemetry showed accesschk.exe is not a signed Microsoft binary which can be used to verify it is not the legitimate Sysinternals tool. The detection was correlated to a parent alert on rcs.3aka3.doc for the execution of a rogue unusual executable.
[1]
|
|
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
[1]