Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
3.B.1
|
|
|
A General alert detection (blue indicator) was generated for the addition of the DelegateExecute Registry Value.
[1]
|
|
An MSSP detection for "Component Object Model Hijacking" was received that included a PowerShell script and explained that it was used to modify a COM component to delegate execution.
[1]
[2]
[3]
|
|
14.A.1
|
|
|
A General alert detection (blue indicator) was generated for powershell.exe loading code that creates the DelegateExecute Registry key.
[1]
[2]
|
|
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
[2]
[3]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
[2]