Execution T1059.001 suspicious_powershell: Creates suspicious powershell process
T1047 has_wmi: Executes one or several WMI requests
Persistence T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 persistence_services: Modifies Services registry key
T1574.011 persistence_services: Modifies Services registry key
Privilege Escalation T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 persistence_services: Modifies Services registry key
T1574.011 persistence_services: Modifies Services registry key
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1574.011 persistence_services: Modifies Services registry key
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497.001 antivm_queries_computername: Retrieves the computer name
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access T1552.001 infostealer_bitcoin: Attempts to obtain access to Bitcoin/ALTCoin wallets
Discovery T1057 has_wmi: Executes one or several WMI requests
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1057 process_interest: Enumerates processes
T1082 reads_csrss: Attempts to read csrss.exe memory
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497.001 antivm_queries_computername: Retrieves the computer name
Collection T1113 screenshot_file: Possibly, makes a screenshot and saves it to a file
Command and Control T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Impact T1486 modifies_files2: Cryptolocker indicators detected (100 or more files are modified)
T1486 modifies_files: Cryptolocker indicators detected (renamed 100 or more files)
T1489 stops_service: Stops Windows services
T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
T1486 ransomware_files: Ransomware indicators detected REvil (creates keys and the instruction on how to unlock the files)
T1489 service_control_stop: Stops services via ControlService
Other yara_rules: Static rules
ce_info: REvil note, REvil config Configuration Data found
revil: Ransomware REvil indicators detected
creates_exe: Creates executable files in the file system
executes_dropped_exe: Executes dropped exe files
modifies_certs: Attempts to generate or modify system certificates
cryptolocker_wallpaper: Ransomware indicators detected (changes the desktop wallpaper file)
dns_without_resolve: DNS query without a response
dead_host: Connects to IP addresses that do not respond to requests
unexpected_exception: Unexpected exception
create_rpc_bindings: Creates RPC connection
break_limit_exceeded: Warning: function calls limit has been exceeded
test_check_service: Starts services
writes_data: Writes big amount of data to disk