Initial Access T1192 downloader_ms_word: Suspicious link to an external file (Microsoft Word)
Execution T1203 exploit_CVE_2022_30190: Exploitation of Follina (CVE-2022-30190) Vulnerability
T1204.002 office_com_load: Microsoft Office loads COM DLL files (indicator of COM usage in macros)
Defense Evasion T1497 evasion_trustrecords: Attempts to detect Sandbox exploring trusted documents
Credential Access T1056.001 infostealer_keylogger: Keylogger (intercepts keystrokes)
Discovery T1083 checks_recent_files: Attempt to check recently opened files through registry
T1497 evasion_trustrecords: Attempts to detect Sandbox exploring trusted documents
Collection T1056.001 infostealer_keylogger: Keylogger (intercepts keystrokes)
Command and Control T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
T1071.001 wininet_https: Performs HTTP/HTTPS requests using WinInet
Other yara_rules: Static rules
creates_suspended_process: Creates suspended process
test_check_service: Starts services