text
stringlengths
65
3.78k
label
int64
0
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\WinZip\winzip64.exe" (echo 1) else (echo 0)" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\osmwwrxw.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES24DA.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSCDA330A84A8B4F49B56A1CF06D1738D9.TMP"
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\3d31m1j0\3d31m1j0.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBAC1.tmp" "c:\Users\Administrator\AppData\Local\Temp\3d31m1j0\CSC13DE0F26EF8E4FD8A87D96E770665F14.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe SYSTEM
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\System32\svchost.exe -k smbsvcs
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
0
cmd.exe "cmd.exe" /c "xcopy /I /Y C:\AtomicRedTeam\atomics\T1505.003\src C:\inetpub\wwwroot" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinHostMon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" reg.exe reg save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security"
0
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {1..10 | % { try { [System.IO.File]::Copy(\""\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy$_\Windows\System32\config\SAM\"" , \""$env:TEMP\SAMvss$_\"", \""true\"") } catch {} ls \""$env:TEMP\SAMvss$_\"" -ErrorAction Ignore }} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\pug2a4w5\pug2a4w5.cmdline"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinHostMon.cmd" --scheme"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe U
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\CompatTelRunner.exe CompatTelRunner.exe C:\Windows\system32\CompatTelRunner.exe -m:appraiser.dll -f:DoScheduledTelemetryRun -cv:fWw2oVhlD0a/xttT.2
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\qtwax1xj\qtwax1xj.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES919E.tmp" "c:\Users\Administrator\AppData\Local\Temp\qtwax1xj\CSCB3DBC51C735E42EDB4C5E3FFA775F54.TMP"
0
cmd.exe C:\Windows\System32\cmd.exe /c "takeown.exe /f %temp%\T1222.001_takeown_folder /r" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\perfmon.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "path=%path%;"C:\Program Files (x86)\winzip" & mkdir .\tmp\victim-files & cd .\tmp\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%ProgramFiles%\WinZip\winzip64.exe" -min -a -s"hello" archive.zip * & dir" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _RAW_envvars splunkd.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_takeown_folder & echo T1222.001_takeown1 >> %%temp%%\T1222.001_takeown_folder\T1222.001_takeown1.txt & echo T1222.001_takeown2 >> %%temp%%\T1222.001_takeown_folder\T1222.001_takeown2.txt" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "cmd.exe" /c "del /A:H %%temp%%\T1222.001_attrib_2\T1222.001_attrib*.txt >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal pre-flight-checks --answer-yes --no-prompt 2>&1 splunkd.exe ar-win-2.attackrange.local
1
cmd.exe cmd.exe /c "reg.exe save hklm\system C:\Users\ADMINI~1\AppData\Local\Temp\wzpkgricxjp" WinCreds.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "del /f /q /s %USERPROFILE%\T1560.001-data.rar >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe unsecapp.exe C:\Windows\system32\wbem\unsecapp.exe -Embedding
0
reg.exe reg.exe reg save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security cmd.exe "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "cmd.exe" /c "%%LOCALAPPDATA:~-3,1%%md /c echo Hello, from CMD! > hello.txt & type hello.txt" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy8\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss8 2
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinEventLog.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe wsqmcons.exe "C:\Windows\System32\wsqmcons.exe"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\taskhostw.exe ngentask.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\NGenTask.exe" /RuntimeWide /StopEvent:704
0
cmd.exe "cmd.exe" /c "del /f /q /s %%USERPROFILE%%\T1560.001-data.rar >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "del %%temp%%\sam >nul 2> nul & del %%temp%%\system >nul 2> nul & del %%temp%%\security >nul 2> nul"
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {1..10 | % { try { [System.IO.File]::Copy(\""\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy$_\Windows\System32\config\SAM\"" , \""$env:TEMP\SAMvss$_\"", \""true\"") } catch {} ls \""$env:TEMP\SAMvss$_\"" -ErrorAction Ignore }} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe lpremove.exe "C:\Windows\system32\lpremove.exe"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\DiskSnapshot.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\system32\svchost.exe -k RPCSS
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal_extra_splunkd_service_args splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" web list settings --no-log
0
cmd.exe C:\Windows\system32\cmd.exe /c btool server list sslConfig --no-log splunk.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "net user $ /DELETE 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe unknown C:\Windows\System32\cmd.exe /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe SpeechModelDownload.exe "C:\Windows\system32\speech_onecore\common\SpeechModelDownload.exe"
0
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy6\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss6 2
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool" validate-regex --log-warnings
0
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe unknown C:\Windows\System32\cmd.exe /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%ProgramFiles%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss1 2
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 powershell.exe "powershell.exe" & {}
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe C:\Windows\System32\cmd.exe /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy10\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss10 2
0
cmd.exe C:\Windows\System32\cmd.exe /c "del "%TEMP%\test.bin" >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c ""
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\admon.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" ExecuteQueuedItems /LegacyServiceBehavior
0
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell2.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
ngrok.exe unknown "C:\Users\Public\ngrok\ngrok.exe" config add-authtoken N/A powershell.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\System32\svchost.exe -k NetworkService
0
cmd.exe "cmd.exe" /c "path=%%path%%;"C:\Program Files (x86)\winzip" & mkdir .\tmp\victim-files & cd .\tmp\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%ProgramFiles%%\WinZip\winzip64.exe" -min -a -s"hello" archive.zip * & dir" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "sc.exe stop spooler" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe query hklm\software\microsoft\windows\softwareinventorylogging /v collectionstate /reg:64 cmd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\SppExtComObj.Exe slui.exe "C:\Windows\System32\SLUI.exe" RuleId=502ff3ba-669a-4674-bbb1-601f34a3b968;Action=AutoActivateSilent;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=21c56779-b449-4d20-adfc-eece0e1ad74b;NotificationInterval=1440;Trigger=TimerEvent
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES7F3F.tmp" "c:\Users\Administrator\AppData\Local\Temp\ek1sxfsl\CSCFA0AD5DEA8134F8C911EE8C63A98399.TMP"
0
cmd.exe C:\Windows\System32\cmd.exe /c "attrib.exe -r %temp%\T1222.001_attrib\*.* /s" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "taskkill.exe /f /im spoolsv.exe" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" reg.exe reg save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinNetMon.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list kvstore --no-log
0
cmd.exe "C:\Windows\system32\cmd.exe" /d /c C:\Windows\system32\silcollector.cmd configure svchost.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c c:\windows\system32\calc.exe cmd.exe ar-win-dc.attackrange.local
1
ngrok.exe - "C:\Users\Public\ngrok\ngrok.exe" config add-authtoken N/A powershell.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\vmcjfqdn\vmcjfqdn.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESAC69.tmp" "c:\Users\Administrator\AppData\Local\Temp\vmcjfqdn\CSCF1AEBBE652C544BBBF2DDE44CF25F4E6.TMP"
0
cmd.exe "cmd.exe" /c "sc sdset AtomicService "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)" & sc.exe delete AtomicService" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "xcopy /I /Y C:\AtomicRedTeam\atomics\T1505.003\src C:\inetpub\wwwroot" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
0
cmd.exe "cmd.exe" /c "takeown.exe /f %%temp%%\T1222.001_takeown_folder /r" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "py -3 -m pip --version >nul 2>&1 && exit /b %errorlevel%"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\perfmon.cmd" --scheme"
0
cmd.exe "cmd.exe" /c "takeown.exe /f %%temp%%\T1222.001_takeown_folder /r" powershell.exe ar-win-dc.attackrange.local
1