Privilege Escalation T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1497.003 antisandbox_idletime: Detects Windows Idle Time to determine the uptime
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Discovery T1497.003 antisandbox_idletime: Detects Windows Idle Time to determine the uptime
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1497.001 antivm_queries_computername: Retrieves the computer name
Command and Control T1071.001 wininet_https: Performs HTTP/HTTPS requests using WinInet
Exfiltration T1022 encrypts_pc_info: Collects and encrypts information about the computer (possibly for exfiltration)
Other yara_rules: Static rules
ce_info: Gozi static config Configuration Data found
gozi2_downloader: Detected downloader of banker GOZI(ver 2)
gozi_downloader: GOZI family trojan downloader detected (undefined version)
dns_without_resolve: DNS query without a response
hidden_ie: Starts hidden Internet Explorer
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
pe_overlay: PE file contains overlay