Carbanak+FIN7
|
The subtechnique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
3.B.1
|
|
|
Telemetry showed addition of the DelegateExecute Registry Value. The detection was correlated to a parent grouping of malicious activity.
[1]
|
|
An MSSP detection for "T1122" occurred containing evidence of DelegateExecute subkey being added to the Registry.
[1]
|
|
14.A.1
|
|
Telemetry
(Correlated, Configuration Change (UX))
|
Telemetry showed PowerShell function definition of "bypass" which adds the DelegateExecute subkey. The detection was correlated to a parent grouping of malicious activity.
[1]
|
|
An MSSP detection for "T1122" occurred containing evidence of "bypass" function definition with Software\classes\folder Registry key being modified and leveraged in COM hijacking.
[1]
|
|
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
-
A UX Configuration Change was made to bring PowerShell script block logs into the user interface.
[1]
Modified the Registry to enable COM hijacking of sdclt.exe using PowerShell
Addition of the DelegateExecute subkey in HKCU\Software\Classes\Folder\shell\open\command
[1]
APT3
|
The subtechnique was not in scope.
|