APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.2
|
|
|
A Technique alert detection (yellow; medium severity) called NTFS File Attributes was generated due to execution of schemas ADS by powershell.exe.
[1]
|
|
An MSSP detection contained evidence of PowerShell executing schemas ADS via Get-Content and IEX.
[1]
|
|
Telemetry showed powershell.exe executing the schemas ADS with Get-Content and IEX.
[1]
|
|
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]