Initial Access T1192 html_urls: HTML-document downloads a file
Execution T1059 network_wscript_downloader: Wscript.exe initiated network communication
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1059 suspicious_process: Spawns a suspicious process
T1059.001 suspicious_process: Spawns a suspicious process
T1047 antivm_wmi: Uses WMI to detect virtual environment
T1047 has_wmi: Executes one or several WMI requests
T1559.001 com_exec: Execution of Win32_Process.Create COM Method
T1059 wscript_info_discovery: Collects info about system with Wscript.Shell
Persistence T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1197 rat_darkwatchman: DarkWatchman RAT indicators detected
Privilege Escalation T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1070.004 deletes_self: Moves to different location or removes the original executable file
T1197 rat_darkwatchman: DarkWatchman RAT indicators detected
T1036.001 invalid_authenticode: Digital signature of the executable file has failed the verification
T1497 debugs_self: Creates a process and debugs it
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1562.001 windows_defender_add_exclusion: Adds a path to Microsoft Defender exclusion list
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
Discovery T1082 has_wmi: Executes one or several WMI requests
T1497 debugs_self: Creates a process and debugs it
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1518.001 wmi_check_av: Uses WMI to check for installed antivirus software
T1518 locates_browser: Attempts to identify where browsers are installed
T1082 wscript_info_discovery: Collects info about system with Wscript.Shell
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1033 wscript_info_discovery: Collects info about system with Wscript.Shell
Command and Control T1071 network_wscript_downloader: Wscript.exe initiated network communication
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Impact T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
Other ransomware_shadowcopy: Removes volume shadow copies
creates_exe: Creates executable files in the file system
modifies_certs: Attempts to generate or modify system certificates
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
break_limit_exceeded: Warning: function calls limit has been exceeded
message_box: Displays a message
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
pe_overlay: PE file contains overlay
suricata_alert: Malicious traffic detected