text
stringlengths 65
282
| label
int64 0
1
|
---|---|
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "at 13:20 /interactive cmd" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list general --no-log | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN "Atomic task" /TR "C:\windows\system32\cmd.exe" /SC daily /ST 20:10" | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\atomics\..\ExternalPayloads\nircmd.exe win child class Shell_TrayWnd hide class TrayClockWClass | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\7-zip\7z.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\WinZip\winzip64.exe" (echo 1) else (echo 0)" | 1 |
ar-win-2.attackrange.local Administrator cmd.exe sc.exe sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list kvstore --no-log | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "attrib.exe -r %%temp%%\T1222.001_attrib\*.* /s" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\lpremove.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" ExecuteQueuedItems /LegacyServiceBehavior | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinRegMon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list replication_port --no-log | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe cmd.exe C:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe query hklm\software\microsoft\windows\softwareinventorylogging /v collectionstate /reg:64 | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%programfiles%%/WinRAR/Rar.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\mcbuilder.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\dstokenclean.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list watchdog --no-log | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\XblGameSaveTask.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "%%LOCALAPPDATA:~-3,1%%md /c echo Hello, from CMD! > hello.txt & type hello.txt" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c ""%%programfiles%%/WinRAR/Rar.exe" a -r %%USERPROFILE%%\T1560.001-data.rar %%USERPROFILE%%\*.txt" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\7-zip\7z.exe" (exit /b 1)" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%programfiles%%/WinRAR/Rar.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" RemoveTaskDelayStartTrigger /LegacyServiceBehavior | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%programfiles%/WinRAR/Rar.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinEventLog.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "" | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal pre-flight-checks --answer-yes --no-text 2>&1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" web list settings --no-log | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "at 13:20 /interactive cmd" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\lpremove.exe mcbuilder.exe C:\Windows\system32\mcbuilder.exe | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinNetMon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\Defrag.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal_extra_splunkd_service_args | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\WinZip\winzip64.exe" (echo 1) else (echo 0)" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001-folder-perms-backup.txt ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local Administrator cmd.exe sc.exe C:\Windows\System32\sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list kvstore --no-log | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool web list settings --no-log | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "for /l %x in (1,1,75) do start wordpad.exe /p C:\AtomicRedTeam\atomics\..\ExternalPayloads\T1059_003note.txt" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinPrintMon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list sslConfig --no-log | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\CompatTelRunner.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local Administrator cmd.exe sc.exe C:\Windows\System32\sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list general --no-log | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\SppExtComObj.Exe slui.exe "C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=21c56779-b449-4d20-adfc-eece0e1ad74b;Trigger=TimerEvent | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool" validate-regex --log-warnings | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c ""%%programfiles%%/WinRAR/Rar.exe" a -r %%USERPROFILE%%\T1560.001-data.rar %%USERPROFILE%%\*.txt" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list watchdog --no-log | 0 |
ar-win-2.attackrange.local svchost.exe cmd.exe "C:\Windows\system32\cmd.exe" /d /c C:\Windows\system32\silcollector.cmd configure | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "SCHTASKS /Delete /TN spawn /F >nul 2>&1" | 1 |
ar-win-2.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "del "%%TEMP%%\test.bin" >nul 2>&1" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list sslConfig --no-log | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\atomics\..\ExternalPayloads\nircmd.exe win child class Shell_TrayWnd hide class TrayClockWClass | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list replication_port --no-log | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "del "%%TEMP%%\test.bin" >nul 2>&1" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe reg.exe C:\Windows\system32\reg.exe query hklm\software\microsoft\windows\softwareinventorylogging /v collectionstate /reg:64 | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\7-zip\7z.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\CompatTelRunner.exe CompatTelRunner.exe C:\Windows\system32\CompatTelRunner.exe -m:invagent.dll -f:RunUpdate -cv:fWw2oVhlD0a/xttT.5 | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool" validate-strptime --log-warnings | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\makecab.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%%ProgramFiles%%\WinZip\winzip64.exe" (echo 1) else (echo 0)" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001-folder-perms-backup.txt ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "for /l %x in (1,1,75) do start wordpad.exe /p C:\AtomicRedTeam\atomics\..\ExternalPayloads\T1059_003note.txt" | 1 |
ar-win-dc.attackrange.local Administrator cmd.exe sc.exe sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\DiskSnapshot.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _RAW_envvars | 0 |
ar-win-2.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%programfiles%/WinRAR/Rar.exe" (exit /b 1)" | 1 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\perfmon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\admon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell2.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinHostMon.cmd" --scheme" | 0 |
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool" check --no-log | 0 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\7-zip\7z.exe" (exit /b 1)" | 1 |
ar-win-dc.attackrange.local powershell.exe cmd.exe "cmd.exe" /c "%%LOCALAPPDATA:~-3,1%%md /c echo Hello, from CMD! > hello.txt & type hello.txt" | 1 |