Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.C.1
|
|
|
A Specific Behavior alert was generated for powershell.exe with a severity score of 51/100 when magnify.exe was replaced. The alert was also mapped to the correct ATT&CK Technique (T1015 - Accessibility Features).
[1]
[2]
|
|
Telemetry showed filemod events overwriting magnify.exe in the system directory.
[1]
[2]
|
|
20.A.1.1
|
|
|
A Specific Behavior alert was generated on execution of magnify.exe named \"Suspicious screen magnifier process\" with a 76/100 severity score.
[1]
[2]
|
|
A General Behavior alert was generated named \"Execution of cmd from non-standard path\" with a 60/100 severity score.
[1]
[2]
|
|
A General Behavior alert was generated named \"Suspicious renamed cmd process\" with a 72/100 severity score.
[1]
[2]
|
|
Telemetry within the process tree that showed magnify.exe executing from utilman.exe.
[1]
[2]
|
|
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
Empire: 'copy' via PowerShell to overwrite magnify.exe with cmd.exe
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]
magnifer.exe previously overwritten by cmd.exe launched through RDP connection made to Creeper (10.0.0.4)
[1]
[2]