Execution T1059.001 suspicious_powershell: Creates suspicious powershell process
T1106 susp_callbacks: Suspicious usage of some WinAPI with callbacks
T1047 has_wmi: Executes one or several WMI requests
Privilege Escalation T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1036 copies_utilities: Copies and runs system utility with different name
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery T1082 uses_windows_utilities: Uses Windows utilities for basic Windows functionality
T1083 crawls_directories: Opens a huge number of directories all over disk C: (possibly, searches for sensitive data)
T1518 locates_browser: Attempts to identify where browsers are installed
T1082 reads_csrss: Attempts to read csrss.exe memory
T1497.001 antivm_queries_computername: Retrieves the computer name
Collection T1560.001 archive_via_utility: Detected archiving data via utility
Command and Control T1105 lolbin_extrac32: Download or Copy file with Extrac32
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other yara_rules: Static rules
executes_dropped_exe: Executes dropped exe files
creates_exe: Creates executable files in the file system
creates_in_windows: Creates files in the Windows directory
dbatloader_behaviour: DBatLoader/ModiLoader behaviour
process_crashed: One of the processes has failed
no_graphical_activity: No graphic activity
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
suricata_alert: Malicious traffic detected