Home >
Enterprise >
Participants >
Cybereason >
Remote Services: SMB/Windows Admin Shares (T1021.002)
|
|
See subtechnique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
5.C.2
|
|
|||||
16.A.5
|
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
8.C.2
|
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
16.A.1.2
|
|
|||||
16.B.1.2
|
|
|||||
16.D.1.1
|
|
Procedure
Empire: Brute force password spraying attempts targeted Windows admin shares on Morris (10.0.1.4) and Nimda (10.0.1.6)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]


[4]


[5]


Procedure
Empire: Successful authentication targeted Windows admin share on Conficker (10.0.0.5)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


Procedure
Empire: Successful authentication targeted Windows admin shares on Conficker (10.0.0.5)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]

