Carbanak+FIN7
|
The technique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
18.A.1
|
|
General
(Correlated, Alert)
|
A General alert detection (red indicator) called "Non-browser access to a web service" was generated when net.exe made an HTTPS connection to a OneDrive URL. The detection was correlated to a parent alert for a suspicious Powershell process being spawned by explorer.exe.
[1]
|
General
(Alert, Correlated)
|
A General alert detection (red indicator) called "WebDAV drive mount from net.exe over HTTPS" was generated when net.exe made an HTTPS connection. The detection was correlated to a parent alert for a suspicious Powershell process being spawned by explorer.exe.
[1]
|
|
An MSSP detection contained evidence of net.exe connection to OneDrive over TCP port 443.
[1]
|
|
Telemetry showed net.exe with command-line arguments to connect to a OneDrive URL as well as net.exe subsequently making a network connection to public IPs over port 443. The detection was correlated to a parent alert for a suspicious Powershell process being spawned by explorer.exe.
[1]
|
|
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
APT3
|
The technique was not in scope.
|