Carbanak+FIN7
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
6.A.3
|
|
|
A Technique detection named "Account Discovery" was generated when PowerShell executed Get-NetUser.
[1]
[2]
|
|
A General detection named "PowerShell/PowerView.A" was generated when PowerView was identified in memory.
[1]
|
|
|
|
PowerShell executes Get-NetUser
-
Script Logs
-
Process Monitoring
[1]
[2]
PowerShell executes Get-NetUser
-
Script Logs
-
Process Monitoring
[1]
PowerShell executes Get-NetUser
-
Process Monitoring
-
Script Logs
[1]
[2]
APT29
|
The subtechnique was not in scope.
|
APT3
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
2.G.1
|
|
General Behavior
(Delayed)
|
A delayed General Behavior alert occurred due to a sequence of exploration commands that was classified as suspicious.
[1]
[2]
[3]
|
|
Telemetry showed the execution sequence of cmd.exe running net.exe with command-line arguments.
[1]
[2]
[3]
|
|
2.G.2
|
|
General Behavior
(Delayed)
|
A delayed General Behavior alert occurred due to a sequence of exploration activities that was classified as suspicious.
[1]
[2]
[3]
[4]
|
|
Telemetry showed the execution sequence of cmd.exe running net.exe with command-line arguments.
[1]
[2]
[3]
[4]
|
|
12.G.2
|
|
Specific Behavior
(Delayed)
|
A delayed Specific Behavior alert called \"Reconnaissance using directory services queries\" was generated for domain user enumeration.
[1]
[2]
[3]
[4]
|
General Behavior
(Delayed)
|
A delayed General Behavior alert was generated for \"Suspicious sequence of exploration activities\".
[1]
[2]
[3]
[4]
|
|
Telemetry showed the execution sequence for powershell.exe executing net.exe with command-line arguments. The telemetry was tainted by a prior suspicious PowerShell cmdlet alert.
[1]
[2]
[3]
[4]
|
|
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
[3]
Cobalt Strike: 'net user -domain' via cmd
[1]
[2]
[3]