Home  >  APT29  >  Results  >  F-Secure  >  Execution through API

Technique Results: Execution through API (T1106) Technique Page Information

The ATT&CK technique page displays all procedures used to test the technique, and their respective detections. The Procedure column contains a description of how the technique was tested . The Step column is where the procedure occurred in the operational flow. Click the Step Number to view it in the Operational Flow panel. Detections are classified by one or more Detection Types, summarized by the Detection Notes, and may be supported by screenshots.

MITRE does not assign scores, rankings, or ratings. The evaluation results are available to the public, so other organizations may provide their own analysis and interpretation - these are not endorsed or validated by MITRE.

Vendor Configuration     All Results JSON Legend
Legend
Main Detection Categories: Detection Modifiers:

None

Telemetry

Indicator of
Compromise

General
Behavior

MSSP

General

Tactic

Specific
Behavior

Technique

Enrichment

Tainted

Alert

Correlated

Delayed

Host
Interrogation

Residual
Artifact

Configuration
Change

Innovative
Procedures Criteria Step
Detection Type Detection Notes
Executed API call by reflectively loading Netapi32.dll
The NetUserGetGroups API function loaded into powershell.exe from Netapi32.dll
4.C.10
Telemetry
Telemetry showed the NetUserGetGroups API function from Netapi32.dll. [1]
Executed API call by reflectively loading Netapi32.dll
The NetUserGetLocalGroups API function loaded into powershelle.exe from Netapi32.dll
4.C.12
Telemetry
Telemetry showed the NetUserGetLocalGroups API function from Netapi32.dll. [1]
Executed PowerShell payload via the CreateProcessWithToken API
hostui.exe executing the CreateProcessWithToken API
10.B.2
None
No detection capability demonstrated for this procedure, though data showed svchost.exe with -seclogon flag spawning before PowerShell. [1]
Executed the ConvertSidToStringSid API call by reflectively loading Advapi32.dll
powershell.exe executing the ConvertSidToStringSid API function by loading Advapi32.dll
16.B.2
Telemetry
Telemetry showed that PowerShell loaded Advapi32.dll in order to execute the ConvertSidToStringSid API function. [1]