Execution T1059.003 executes_dropped_cmd: Executes dropped batch files
Privilege Escalation T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1027.002 packer_polymorphic: Creates a modified copy of itself
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1070 stealth_window: A process created a hidden window
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Other yara_rules: Static rules
creates_exe: Creates executable files in the file system
http_file_not_found: Attempts to download EXE or DLL file but receives HTML with an error
executes_dropped_exe: Executes dropped exe files
no_graphical_activity: No graphic activity
create_rpc_bindings: Creates RPC connection
creates_suspended_process: Creates suspended process
creates_in_programdata: Creates files in the ProgramData directory