Privilege Escalation T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1497 antidbg_setinformationthread: Attempts to evade debugger using NtSetInformationThread
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antivm_queries_computername: Retrieves the computer name
Discovery T1497 antidbg_setinformationthread: Attempts to evade debugger using NtSetInformationThread
T1518 locates_browser: Attempts to identify where browsers are installed
T1135 server_share_info: Retrieves information about each shared resource on a server
T1497.001 antivm_queries_computername: Retrieves the computer name
Other yara_rules: Static rules
lockbit: Detected ransomware Lockbit
create_rpc_bindings: Creates RPC connection
get_policy_info: Retrieves information about a Policy object
creates_in_programdata: Creates files in the ProgramData directory
checktokenmembership: Checks user token with CheckTokenMembership call