Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
11.A.6
|
|
Technique
(Configuration Change (Detection Logic))
|
A Technique detection named "T1036 - Masquerading as a Windows EXE" (Critical) was generated when mshta.exe made a copy of the legitimate wscript.exe as Adb156.exe.
[1]
|
|
|
|
A Tactic detection named "TA0005 - Defense Evasion" was generated when mshta.exe made a copy of the legitimate wscript.exe as Adb156.exe.
[1]
|
|
mshta.exe makes a copy of the legitimate wscript.exe as Adb156.exe
-
Process Monitoring
-
File Monitoring
[1]
mshta.exe makes a copy of the legitimate wscript.exe as Adb156.exe
-
Process Monitoring
-
File Monitoring
[1]
[2]
[3]
mshta.exe makes a copy of the legitimate wscript.exe as Adb156.exe
-
File Monitoring
-
Process Monitoring
[1]