Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
17.A.2
|
|
|
A Technique detection named "T1036 Masquerading" (9) was generated when srrstr.dll was detected as not legitimate .
[1]
|
|
srrstr.dll is not the legitimate Windows System Protection Configuration Library
[1]
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
An MSSP detection for "Masquerading" was received that included an execution event for accesschk.exe and explained that the file was masquerading as a legitimate SysInternals tool. Additional data was received that included details of the file accesscheck.exe such as the hash, company name, and signer.
[1]
[2]
|
|
Masqueraded a Chrome password dump tool as accesscheck.exe, a legitimate Sysinternals tool
Evidence that accesschk.exe is not the legitimate Sysinternals tool
[1]
[2]