Carbanak+FIN7
|
The technique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.2
|
|
|
Telemetry showed powershell.exe executing the schemas ADS with Get-Content and IEX.
[1]
|
|
An MSSP detection for "NTFS File Attributes" was received that included the PowerShell command used by the adversary and explained that it was used to retrieve the PowerShell script from the schemas Alternate Data Stream and execute it.
[1]
|
|
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]
Executed an alternate data stream (ADS) using PowerShell
powershell.exe executing the schemas ADS via Get-Content and IEX
[1]