Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.3
|
|
|
A Technique detection named "Suspicious mshta process launched" (Low) was generated when winword.exe spawned mshta.exe.
[1]
[2]
|
|
A Tactic detection named "Execution" was generated when winword.exe spawned mshta.exe.
[1]
|
|
|
|
A Technique detection named "Use of living-off-the-land binary to run malicious code" (Low) was generated when winword.exe spawned a known living-off-the-land binary (mshta.exe).
[1]
|
|
A General detection named "An Office application ran suspicious commands" was generated when mshta.exe was executed as a child process from an Office application (winword.exe).
[1]
|
|
winword.exe spawns mshta.exe
[1]
[2]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
winword.exe spawns mshta.exe
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
A General alert detection (orange, suspicious tag) was generated for kxwn.lock being potential malware.
[1]
|
|
An MSSP detection for Execution was generated containing evidence that rundll32.exe executed the VoidFunc function from file kxwn.lock.
[1]
[2]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
[2]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1.2
|
|
General Behavior
(Delayed)
|
A delayed General Behavior alert was generated for a low-reputation DLL loaded by a signed executable due to rundll32.exe execution of update.dat.
[1]
[2]
|
|
Telemetry showed the execution sequence for rundll32.exe running update.dat.
[1]
[2]
|
|
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]
[2]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]
[2]