Signatures
Checks available memory
Queries computer hostname
SetUnhandledExceptionFilter detected (possible anti-debug)
Checks adapter addresses which can be used to detect virtual network interfaces
At least one process apparently crashed during execution
Checks system language via registry key (possible geofencing)
Guard pages use detected - possible anti-debugging.
Performs HTTP requests potentially not found in PCAP.
Resumed a thread in another process
Establishes an encrypted HTTPS connection
Reads data out of its own binary image
The PE file contains a suspicious PDB path
Creates RWX memory
Establishes an encrypted HTTPS connection to a social media API
Installs itself for autorun at Windows startup
Binary file triggered YARA rule
Yara detections observed in process dumps, payloads or dropped files
Anomalous binary characteristics