Execution T1059.001 url_cmdline: Cmdline of process contains URL
T1059.003 suspicious_batch: Suspicious batch
T1059.003 url_cmdline: Cmdline of process contains URL
T1059.006 drops_python_dll: Drops python dll
Persistence T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1547.009 suspicious_desktop_ini: Creates desktop.ini file with suspicious content
Privilege Escalation T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1547.009 suspicious_desktop_ini: Creates desktop.ini file with suspicious content
Defense Evasion T1218 suspicious_cmdline: Executes a suspicious command
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1564.001 stealth_file: Creates hidden or system files
T1497 debugs_self: Creates a process and debugs it
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
Credential Access T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery T1497 debugs_self: Creates a process and debugs it
T1135 server_share_info: Retrieves information about each shared resource on a server
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
Command and Control T1071.001 network_http: Performs HTTP requests
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other yara_rules: Static rules
drops_interpreter: Creates intrepreter binary file
opens_document: Opens office documents
creates_exe: Creates executable files in the file system
suspicious_process_network: Unusual process network activity detected
creates_doc: Creates (office) documents in the file system
executes_dropped_exe: Executes dropped exe files
unexpected_exception: Unexpected exception
create_rpc_bindings: Creates RPC connection
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
suricata_alert: Malicious traffic detected