Initial Access T1192 html_urls: HTML-document downloads a file
Privilege Escalation T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1497.001 antivm_network_adapters: Checks NIC addresses
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Discovery T1497.001 antivm_network_adapters: Checks NIC addresses
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Command and Control T1102.003 cloud_filetransfer: Connects to cloud services of Filetransfer.io (potentially for malicious payload delivery)
T1071.001 network_cnc_http: Suspicious HTTP traffic
T1071.001 network_http: Performs HTTP requests
Other yara_rules: Static rules
pe_in_bcryptdecrypt: PE found in BCryptDecrypt function
no_graphical_activity: No graphic activity
dotnet_suspicious_resources_names: Dotnet program has suspicious resources names
dotnet_import_unmanaged_code: Dotnet program statically imports unmanaged functions/modules
dotnet_obfuscated: Dotnet program is potentially obfuscated
get_policy_info: Retrieves information about a Policy object
checktokenmembership: Checks user token with CheckTokenMembership call
dotnet_suspicious_module_name: Dotnet program has suspicious module name