Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
9.A.2
|
|
Technique
(Configuration Change (Data Sources))
|
A Technique detection named "Input Capture" was generated when DefenderUpgradeExec.exe called the SetWindowsHookEx API.
[1]
|
|
A General detection named "Imports Suspicious APIs" (Suspicious) was generated when sandbox analysis found DefenderUpgradeExec.exe imported suspicious APIs, including the SetWindowsHookEx API.
[1]
|
|
18.A.4
|
|
|
DefenderUpgradeExec.exe calls the SetWindowsHookEx API
-
System Calls/API Monitoring
-
Process Monitoring
[1]
DefenderUpgradeExec.exe calls the SetWindowsHookEx API
-
Delayed results due to sandbox execution
[1]
mstsc.exe calls APIs such as GetAsyncKeyState, GetKeyState, or GetKeyboardState
-
System Calls/API Monitoring
-
Process Monitoring
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
7.A.3
|
|
|
Telemetry showed PowerShell calling the GetAsyncKeyState API. The detection was correlated to a parent grouping of malicious activity.
[1]
[2]
|
Technique
(Correlated, Alert)
|
A Technique alert detection called "Input Capture" was generated when a process performed reads of the user key buffers. The event was correlated to a parent General detection for User Execution of rcs.3aka.doc.
[1]
[2]
|
|
Captured user keystrokes using the GetAsyncKeyState API
powershell.exe executing the GetAsyncKeyState API
-
All activity associated with an alert is grouped and correlated via the relevant detection tree.
[1]
[2]
Captured user keystrokes using the GetAsyncKeyState API
powershell.exe executing the GetAsyncKeyState API
[1]
[2]
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
8.C.1.1
|
|
|
Minimum detection criteria was not met for this procedure.
[1]
|
|
Cobalt Strike: Built-in keylogging capability executed to capture keystrokes of user Debbie
[1]