Home >
Enterprise >
Participants >
GoSecure >
Remote Services (T1021)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
5.A.7
![]() |
|
|||||
5.B.1
![]() |
|
|||||
5.C.2
|
|
|||||
7.A.5
|
|
|||||
7.B.3
|
|
|||||
16.A.5
|
|
|||||
19.A.2
|
|
Criteria
SMB session from 10.0.1.5 to 10.0.1.6 over TCP port 135 or 445 with admin shares accessed
Data Sources
- Network Monitoring
- Process Monitoring
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
8.A.2
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
8.C.2
|
|
|||||||
16.C.1
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
20.B.2
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
6.C.1
|
|
|||||
10.B.1.2
|
|
|||||
16.A.1.2
|
|
|||||
16.B.1.2
|
|
|||||
16.D.1.1
|
|
|||||
20.A.1.2
|
|
Procedure
Cobalt Strike: C2 channel modified to proxy RDP connection to Conficker (10.0.0.5)
Footnotes
- At least one condition contributing to Enrichment was added to the capability's detection after the start of the evaluation, so this detection is identified as a configuration change. See Configuration page for details.


[2]


Procedure
RDP connection made to Conficker (10.0.0.5) as part of execution of persistence mechanism
Footnotes
- The conditions contributing to Enrichment were added to the capability's detection after the start of the evaluation, so this detection is identified as a configuration change. See Configuration page for details.


Procedure
Empire: Brute force password spraying attempts targeted Windows admin shares on Morris (10.0.1.4) and Nimda (10.0.1.6)
Footnotes
- Vendor modified configurations between scenario one and two, but MITRE assesses the change did not significantly affect results for this detection. See Configuration page for details.


[2]


[3]


[4]

