APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
15.A.2
|
|
|
A Technique detection alert (info severity) called "WMI event consumer with base64 content" was generated due to the WindowsParentalControlMigration WMI filter and consumer.
[1]
[2]
[3]
|
|
Telemetry showed the creation of the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription.
[1]
[2]
|
|
A Technique detection alert (high severity) called "WMI Persistence for Encoded PowerShell 2" was generated due to the WindowsParentalControlMigration WMI filter and consumer.
[1]
[2]
|
|
A Technique detection alert (info severity) called "WMI Filter to Consumer Binding" was generated due to the WindowsParentalControlMigration WMI filter and consumer.
[1]
[2]
|
|
20.A.2
|
|
|
Telemetry showed wmiprvse.exe executing the PowerShell stager.
[1]
[2]
|
|
A Technique alert detection (medium severity) was generated for WMI launching a PowerShell downloader.
[1]
[2]
[3]
|
|
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
[3]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
Established WMI event subscription persistence using PowerShell
powershell.exe creating the WindowsParentalControlMigration WMI filter, consumer, and binding created in root/subscription
[1]
[2]
Executed WMI persistence on user login
The WMI process (wmiprvse.exe) executing powershell.exe
[1]
[2]
Executed WMI persistence on user login
The WMI process (wmiprvse.exe) executing powershell.exe
[1]
[2]
[3]