Execution T1204.002 mimics_extension: Attempts to mimic the file extension
T1059.003 executes_dropped_cmd: Executes dropped batch files
T1106 susp_callbacks: Suspicious usage of some WinAPI with callbacks
Persistence T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1055.012 injection_runpe: Injects code into another process
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1055 injection_failed: The attempt to inject into a process has failed
Defense Evasion T1055.012 injection_runpe: Injects code into another process
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1036 mimics_extension: Attempts to mimic the file extension
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1562 registry_hide_tracing: Modifies File/Console tracing settings (often used to hide iocs from the system)
T1055 injection_failed: The attempt to inject into a process has failed
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Command and Control T1102.003 cloud_google: Connects to cloud services of Google (potentially for malicious payload delivery)
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other yara_rules: Static rules
creates_exe: Creates executable files in the file system
unpacker_wrong_base: Possibly, an error occured in the file unpacker
modifies_certs: Attempts to generate or modify system certificates
copies_self: Creates a copy of itself
process_crashed: One of the processes has failed
no_graphical_activity: No graphic activity
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
enables_execute_access_on_stack: Enable execution access on stack