Execution T1047 has_wmi: Executes one or several WMI requests
T1059 autoit: AutoIt script execution detected
T1059.003 suspicious_process: Spawns a suspicious process
T1059.005 obfuscated_vbs: Detected obfuscated VBS
T1204.002 mimics_extension: Attempts to mimic the file extension
T1059.005 obfuscated_vbs_wmi: Suspicious WMI queries from VBScript file
Persistence T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1055 injection_failed: The attempt to inject into a process has failed
Defense Evasion T1218 bypass_dev_utils: Executing .NET utility in a suspended state, potentially for injection
T1564.001 stealth_file: Creates hidden or system files
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1027 obfuscated_vbs: Detected obfuscated VBS
T1055 injection_failed: The attempt to inject into a process has failed
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1027 obfuscated_vbs_wmi: Suspicious WMI queries from VBScript file
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1036 mimics_extension: Attempts to mimic the file extension
Discovery T1082 recon_systeminfo: Collects system information (ipconfig, netstat, systeminfo, net)
T1057 process_interest: Enumerates processes
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1016 system_network_configuration_discovery: System network configuration discovery detected
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
Command and Control T1095 network_icmp: Creates ICMP traffic
Other yara_rules: Static rules
drops_interpreter: Creates intrepreter binary file
creates_exe: Creates executable files in the file system
ipconfig_release: Removes network adapter IP address configuration
creates_doc: Creates (office) documents in the file system
http_file_not_found: Attempts to download EXE or DLL file but receives HTML with an error
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
checktokenmembership: Checks user token with CheckTokenMembership call
writes_data: Writes big amount of data to disk
executes_dropped_exe: Executes dropped exe files