Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
20.A.1
|
|
|
Telemetry showed rundll32.exe executing kxwn.lock.
[1]
|
|
Executed Run key persistence payload on user login using RunDll32
rundll32.exe executing kxwn.lock
[1]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
1.A.1.2
|
|
|
A Specific Behavior alert was generated due to rundll32 launching a suspended process. The alert was mapped to the correct ATT&CK Technique (Rundll32) and Tactic (Defense Evasion).
[1]
[2]
|
General Behavior
(Delayed)
|
OverWatch generated a General Behavior alert indicating rundll32 executing update.dat was suspicious.
[1]
[2]
|
|
Telemetry within the OverWatch alert showed rundll32.exe executing, and would also be available in a separate view.
[1]
[2]
|
|
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
[1]
[2]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
-
OverWatch is the managed threat hunting service.
[1]
[2]
Previously executed batch file (pdfhelper.cmd) launched a DLL payload (update.dat) using Rundll32
-
For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not taken in this instance.
[1]
[2]