Home >
Enterprise >
Participants >
CrowdStrike >
Process Injection (T1055)
|
|
Carbanak+FIN7 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
9.A.3
|
Tactic Defense Evasion (TA0005) |
|
||||||||
16.A.7
|
|
|||||||||
18.A.1
|
Tactic Defense Evasion (TA0005) |
|
||||||||
18.A.3
|
Tactic Defense Evasion (TA0005) |
|
||||||||
20.A.2
|
Tactic Defense Evasion (TA0005) |
|
APT29 |
||
The technique was not in scope. |
APT3 |
||||||||
Step | ATT&CK Pattern |
|
||||||
3.C.1
|
Tactic Execution (TA0002) |
|
||||||
5.A.1.2
|
Tactic Execution (TA0002) |
|
||||||
5.A.2.2
|
Tactic Execution (TA0002) |
|
||||||
8.D.1.2
|
Tactic Execution (TA0002) |
|
Procedure
Cobalt Strike: Built-in process injection capability executed to inject callback into cmd.exe
Footnotes
- For any alert in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was shown to MITRE throughout the evaluation, though a screenshot was not specifically taken in this instance.


[2]

