File size: 107,500 Bytes
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
sample_id,family_id,event_type,timestep,execution_phase,target_pid,api_call_name,registry_key_path,file_path_mutated,network_dst_ip_class,dns_query_domain_class
S0000_0000,RAN00000,uac_bypass_attempted,6,persistence_establishment,41963,CreateServiceW,,,,
S0000_0000,RAN00000,dropper_executed,22,initial_drop,16917,ShellExecuteW,,/var/run/sample_2990.sh,,
S0000_0000,RAN00000,dropper_executed,33,initial_drop,3755,WriteFile,,C:\Windows\Temp\sample_5722.bin,,
S0000_0000,RAN00000,privilege_token_stolen,40,privilege_escalation,37850,OpenProcessToken,,,,
S0000_0000,RAN00000,c2_beacon_sent,43,c2_communication,1753,InternetReadFile,,,unknown_public,dga_generated
S0000_0000,RAN00000,lateral_smb_spread,46,lateral_movement,20700,NetShareEnum,,,tor_exit_node,
S0000_0000,RAN00000,av_signature_evaded,48,dormancy_dwell,9259,WaitForSingleObject,,,,
S0000_0001,BOT00001,dropper_executed,0,payload_execution,49372,VirtualAllocEx,,C:\Users\Public\sample_4680.ps1,,
S0000_0001,BOT00001,data_staged_for_exfil,1,data_exfiltration,23463,send,,C:\Users\Public\sample_8421.ps1,,
S0000_0001,BOT00001,sandbox_timing_check,12,sandbox_evasion_stall,63923,IsDebuggerPresent,,,,
S0000_0001,BOT00001,persistence_registry_written,18,lateral_movement,61068,WMIExecMethod,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0001,BOT00001,c2_beacon_sent,21,c2_communication,20378,InternetReadFile,,,known_c2_infra,known_malicious
S0000_0001,BOT00001,dropper_executed,22,initial_drop,43043,WinExec,,C:\Users\Public\sample_4985.exe,,
S0000_0001,BOT00001,data_staged_for_exfil,23,data_exfiltration,56335,send,,/var/run/sample_2665.exe,,
S0000_0001,BOT00001,payload_ransomware_encrypt,29,payload_execution,28065,CreateThread,,,,
S0000_0001,BOT00001,heuristic_alert_triggered,32,dormancy_dwell,43053,WaitForSingleObject,,,,
S0000_0001,BOT00001,heuristic_alert_triggered,40,persistence_establishment,51432,StartupFolder,,,,
S0000_0001,BOT00001,lateral_smb_spread,44,sandbox_evasion_stall,27251,Sleep,,,cdn_provider,
S0000_0001,BOT00001,lateral_smb_spread,46,lateral_movement,49389,NetShareEnum,,,tor_exit_node,
S0000_0001,BOT00001,payload_ransomware_encrypt,50,payload_execution,17216,WriteProcessMemory,,,,
S0000_0001,BOT00001,persistence_registry_written,54,persistence_establishment,18244,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0002,CRY00002,persistence_registry_written,10,initial_drop,1876,CreateFileW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0000_0002,CRY00002,sandbox_timing_check,15,sandbox_evasion_stall,27973,Sleep,,,,
S0000_0002,CRY00002,av_signature_evaded,27,dormancy_dwell,50346,WaitForSingleObject,,,,
S0000_0002,CRY00002,exfil_dns_tunnel,35,data_exfiltration,40166,HttpSendRequestW,,,,legitimate_tld
S0000_0002,CRY00002,payload_ransomware_encrypt,38,privilege_escalation,55871,AdjustTokenPrivileges,,,,
S0000_0002,CRY00002,payload_cryptominer_spawned,41,dormancy_dwell,31469,NtDelayExecution,,,,
S0000_0002,CRY00002,payload_cryptominer_spawned,47,c2_communication,45081,WSAConnect,,,,
S0000_0003,SPY00003,persistence_registry_written,0,persistence_establishment,56726,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0000_0003,SPY00003,sandbox_timing_check,3,initial_drop,30173,WriteFile,,,,
S0000_0003,SPY00003,dropper_executed,7,initial_drop,13597,CreateFileW,,/var/run/sample_9629.dll,,
S0000_0003,SPY00003,definitive_detection,14,persistence_establishment,29933,SchtasksCreate,,,,
S0000_0003,SPY00003,c2_beacon_sent,22,c2_communication,10863,WSAConnect,,,unknown_public,subdomain_c2
S0000_0003,SPY00003,payload_ransomware_encrypt,39,payload_execution,16791,WriteProcessMemory,,,,
S0000_0003,SPY00003,data_staged_for_exfil,41,data_exfiltration,64927,InternetOpenW,,C:\Users\Public\sample_6292.bin,,
S0000_0003,SPY00003,exfil_dns_tunnel,49,initial_drop,57931,WriteFile,,,,subdomain_c2
S0000_0003,SPY00003,av_signature_evaded,52,dormancy_dwell,26812,SetTimer,,,,
S0000_0004,SPY00004,definitive_detection,2,data_exfiltration,47936,HttpSendRequestW,,,,
S0000_0004,SPY00004,exfil_https_c2,5,privilege_escalation,59997,BypassUAC,,,legitimate_cloud,
S0000_0004,SPY00004,self_delete_executed,9,self_destruct_cleanup,49034,RegDeleteKeyW,,/var/run/sample_6408.dll,,
S0000_0004,SPY00004,data_staged_for_exfil,11,data_exfiltration,27518,DnsQuery_W,,/home/user/.config/sample_5975.dll,,
S0000_0004,SPY00004,definitive_detection,15,sandbox_evasion_stall,51588,Sleep,,,,
S0000_0004,SPY00004,persistence_registry_written,21,persistence_establishment,30235,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0000_0004,SPY00004,privilege_token_stolen,22,privilege_escalation,52014,AdjustTokenPrivileges,,,,
S0000_0004,SPY00004,c2_beacon_sent,23,c2_communication,59138,WSAConnect,,,legitimate_cloud,legitimate_tld
S0000_0004,SPY00004,exfil_dns_tunnel,28,self_destruct_cleanup,3014,SHFileOperationW,,,,dga_generated
S0000_0004,SPY00004,self_delete_executed,29,self_destruct_cleanup,16920,DeleteFileW,,/var/run/sample_1761.sh,,
S0000_0004,SPY00004,c2_beacon_sent,33,payload_execution,19718,WriteProcessMemory,,,tor_exit_node,legitimate_tld
S0000_0004,SPY00004,sandbox_timing_check,35,sandbox_evasion_stall,6024,GetTickCount,,,,
S0000_0004,SPY00004,payload_ransomware_encrypt,47,payload_execution,56339,CreateThread,,,,
S0000_0004,SPY00004,c2_beacon_sent,51,data_exfiltration,3250,InternetOpenW,,,known_c2_infra,dga_generated
S0000_0004,SPY00004,payload_ransomware_encrypt,53,c2_communication,29895,recv,,,,
S0000_0004,SPY00004,payload_ransomware_encrypt,54,payload_execution,22348,VirtualAllocEx,,,,
S0000_0004,SPY00004,payload_keylogger_active,55,initial_drop,29767,ShellExecuteW,,,,
S0000_0004,SPY00004,privilege_token_stolen,56,privilege_escalation,4087,ImpersonateLoggedOnUser,,,,
S0000_0005,APT00005,lateral_smb_spread,2,lateral_movement,51059,WNetAddConnection2W,,,known_c2_infra,
S0000_0005,APT00005,data_staged_for_exfil,8,lateral_movement,43901,NetShareEnum,,/home/user/.config/sample_7354.bin,,
S0000_0005,APT00005,payload_ransomware_encrypt,13,payload_execution,54178,LoadLibraryA,,,,
S0000_0005,APT00005,self_delete_executed,22,self_destruct_cleanup,4011,SHFileOperationW,,/home/user/.config/sample_8678.sh,,
S0000_0005,APT00005,definitive_detection,23,sandbox_evasion_stall,56734,Sleep,,,,
S0000_0005,APT00005,data_staged_for_exfil,27,payload_execution,49053,VirtualAllocEx,,/home/user/.config/sample_5641.sh,,
S0000_0005,APT00005,exfil_dns_tunnel,28,payload_execution,26271,VirtualAllocEx,,,,dga_generated
S0000_0005,APT00005,payload_ransomware_encrypt,40,payload_execution,10111,LoadLibraryA,,,,
S0000_0005,APT00005,sandbox_timing_check,44,sandbox_evasion_stall,22114,Sleep,,,,
S0000_0005,APT00005,c2_beacon_sent,50,c2_communication,61418,connect,,,private_rfc1918,dga_generated
S0000_0005,APT00005,sandbox_timing_check,56,sandbox_evasion_stall,56551,IsDebuggerPresent,,,,
S0000_0006,RAN00006,persistence_registry_written,2,persistence_establishment,47354,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0000_0006,RAN00006,dropper_executed,14,initial_drop,15285,ShellExecuteW,,/home/user/.config/sample_4633.exe,,
S0000_0006,RAN00006,c2_beacon_sent,21,c2_communication,12267,WSAConnect,,,tor_exit_node,subdomain_c2
S0000_0006,RAN00006,data_staged_for_exfil,45,data_exfiltration,43355,InternetOpenW,,/tmp/sample_3006.sh,,
S0000_0006,RAN00006,lateral_smb_spread,51,lateral_movement,58328,WMIExecMethod,,,private_rfc1918,
S0000_0006,RAN00006,data_staged_for_exfil,52,data_exfiltration,46055,HttpSendRequestW,,/var/run/sample_3509.sh,,
S0000_0006,RAN00006,dropper_executed,54,initial_drop,56085,CreateFileW,,C:\ProgramData\sample_4405.ps1,,
S0000_0007,CRY00007,data_staged_for_exfil,0,data_exfiltration,42130,HttpSendRequestW,,/home/user/.config/sample_9920.dll,,
S0000_0007,CRY00007,persistence_registry_written,2,persistence_establishment,31916,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0007,CRY00007,privilege_token_stolen,4,privilege_escalation,11829,AdjustTokenPrivileges,,,,
S0000_0007,CRY00007,sandbox_timing_check,8,sandbox_evasion_stall,18034,CheckRemoteDebuggerPresent,,,,
S0000_0007,CRY00007,self_delete_executed,15,self_destruct_cleanup,43198,RemoveDirectoryW,,/home/user/.config/sample_8472.dll,,
S0000_0007,CRY00007,sandbox_timing_check,18,sandbox_evasion_stall,38413,CheckRemoteDebuggerPresent,,,,
S0000_0007,CRY00007,exfil_dns_tunnel,19,lateral_movement,5773,WNetAddConnection2W,,,,known_malicious
S0000_0007,CRY00007,privilege_token_stolen,25,privilege_escalation,36852,AdjustTokenPrivileges,,,,
S0000_0007,CRY00007,persistence_registry_written,26,persistence_establishment,50740,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0007,CRY00007,self_delete_executed,36,self_destruct_cleanup,50808,SHFileOperationW,,C:\ProgramData\sample_3817.bat,,
S0000_0007,CRY00007,persistence_registry_written,38,persistence_establishment,18977,RegSetValueExW,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0007,CRY00007,self_delete_executed,48,self_destruct_cleanup,51825,RegDeleteKeyW,,/var/run/sample_1868.bat,,
S0000_0007,CRY00007,lateral_smb_spread,49,persistence_establishment,34981,SchtasksCreate,,,private_rfc1918,
S0000_0007,CRY00007,privilege_token_stolen,50,c2_communication,57480,connect,,,,
S0000_0007,CRY00007,lateral_smb_spread,59,lateral_movement,32042,CreateRemoteThread,,,legitimate_cloud,
S0000_0008,ROO00008,data_staged_for_exfil,0,data_exfiltration,5408,send,,C:\Windows\Temp\sample_6933.dll,,
S0000_0008,ROO00008,sandbox_timing_check,1,sandbox_evasion_stall,59361,IsDebuggerPresent,,,,
S0000_0008,ROO00008,dropper_executed,7,self_destruct_cleanup,20095,RegDeleteKeyW,,C:\Windows\Temp\sample_5575.sh,,
S0000_0008,ROO00008,av_signature_evaded,11,persistence_establishment,35660,SchtasksCreate,,,,
S0000_0008,ROO00008,sandbox_vm_artefact_check,30,sandbox_evasion_stall,10607,Sleep,,,,
S0000_0008,ROO00008,privilege_token_stolen,35,privilege_escalation,54787,OpenProcessToken,,,,
S0000_0008,ROO00008,data_staged_for_exfil,37,data_exfiltration,58491,InternetOpenW,,/var/run/sample_1498.ps1,,
S0000_0008,ROO00008,lateral_wmi_exec,44,sandbox_evasion_stall,38709,Sleep,,,,
S0000_0008,ROO00008,av_signature_evaded,54,dormancy_dwell,39734,GetSystemTime,,,,
S0000_0008,ROO00008,dropper_executed,57,initial_drop,57343,CreateFileW,,C:\Users\Public\sample_1981.sh,,
S0000_0008,ROO00008,c2_beacon_sent,58,c2_communication,47757,InternetReadFile,,,unknown_public,known_malicious
S0000_0008,ROO00008,privilege_token_stolen,59,privilege_escalation,46319,AdjustTokenPrivileges,,,,
S0000_0009,RAN00009,data_staged_for_exfil,1,lateral_movement,63896,WNetAddConnection2W,,C:\ProgramData\sample_6094.dll,,
S0000_0009,RAN00009,sandbox_timing_check,2,sandbox_evasion_stall,15706,GetTickCount,,,,
S0000_0009,RAN00009,payload_ransomware_encrypt,10,payload_execution,4763,CreateThread,,,,
S0000_0009,RAN00009,privilege_token_stolen,15,privilege_escalation,7971,BypassUAC,,,,
S0000_0009,RAN00009,privilege_token_stolen,18,privilege_escalation,59153,ImpersonateLoggedOnUser,,,,
S0000_0009,RAN00009,lateral_smb_spread,19,payload_execution,6522,LoadLibraryA,,,private_rfc1918,
S0000_0009,RAN00009,c2_beacon_sent,24,c2_communication,43847,InternetReadFile,,,tor_exit_node,recently_registered
S0000_0009,RAN00009,lateral_wmi_exec,28,payload_execution,41977,CreateThread,,,,
S0000_0009,RAN00009,self_delete_executed,30,self_destruct_cleanup,40940,SHFileOperationW,,C:\Windows\Temp\sample_3096.exe,,
S0000_0009,RAN00009,heuristic_alert_triggered,36,data_exfiltration,28166,InternetOpenW,,,,
S0000_0009,RAN00009,av_signature_evaded,37,dormancy_dwell,12446,GetSystemTime,,,,
S0000_0009,RAN00009,privilege_token_stolen,42,privilege_escalation,1972,ImpersonateLoggedOnUser,,,,
S0000_0009,RAN00009,persistence_registry_written,45,persistence_establishment,26150,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0000_0009,RAN00009,c2_beacon_sent,51,c2_communication,35547,connect,,,legitimate_cloud,legitimate_tld
S0000_0009,RAN00009,lateral_smb_spread,54,lateral_movement,44359,NetShareEnum,,,private_rfc1918,
S0000_0009,RAN00009,av_signature_evaded,57,dormancy_dwell,58232,SetTimer,,,,
S0001_0000,FIL00010,sandbox_vm_artefact_check,4,initial_drop,61382,ShellExecuteW,,,,
S0001_0000,FIL00010,lateral_wmi_exec,11,self_destruct_cleanup,3517,RegDeleteKeyW,,,,
S0001_0000,FIL00010,persistence_scheduled_task,17,dormancy_dwell,17903,NtDelayExecution,,,,
S0001_0000,FIL00010,payload_ransomware_encrypt,19,payload_execution,50452,VirtualAllocEx,,,,
S0001_0000,FIL00010,persistence_registry_written,25,persistence_establishment,15812,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0001_0000,FIL00010,lateral_smb_spread,28,persistence_establishment,64452,CreateServiceW,,,unknown_public,
S0001_0000,FIL00010,dropper_executed,30,initial_drop,4418,ShellExecuteW,,C:\Windows\Temp\sample_7538.ps1,,
S0001_0000,FIL00010,data_staged_for_exfil,32,c2_communication,44858,connect,,C:\ProgramData\sample_2978.exe,,
S0001_0000,FIL00010,dropper_executed,33,initial_drop,19111,CreateFileW,,/home/user/.config/sample_3553.bat,,
S0001_0000,FIL00010,persistence_registry_written,41,persistence_establishment,19691,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0001_0000,FIL00010,anti_debug_triggered,43,payload_execution,61785,WriteProcessMemory,,,,
S0001_0000,FIL00010,heuristic_alert_triggered,45,persistence_establishment,56986,StartupFolder,,,,
S0001_0000,FIL00010,persistence_registry_written,50,persistence_establishment,54311,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0001_0000,FIL00010,c2_beacon_sent,54,c2_communication,14890,recv,,,private_rfc1918,legitimate_tld
S0001_0000,FIL00010,definitive_detection,55,data_exfiltration,64288,DnsQuery_W,,,,
S0001_0000,FIL00010,privilege_token_stolen,59,privilege_escalation,13383,BypassUAC,,,,
S0001_0001,DRO00011,self_delete_executed,7,initial_drop,31781,WinExec,,/tmp/sample_3650.exe,,
S0001_0001,DRO00011,sandbox_timing_check,22,sandbox_evasion_stall,36752,IsDebuggerPresent,,,,
S0001_0001,DRO00011,privilege_token_stolen,31,privilege_escalation,44584,ImpersonateLoggedOnUser,,,,
S0001_0001,DRO00011,dll_sideloading_executed,33,persistence_establishment,13085,StartupFolder,,C:\Windows\Temp\sample_2379.dll,,
S0001_0001,DRO00011,av_signature_evaded,38,dormancy_dwell,36298,NtDelayExecution,,,,
S0001_0001,DRO00011,sandbox_timing_check,40,sandbox_evasion_stall,22849,GetTickCount,,,,
S0001_0001,DRO00011,payload_ransomware_encrypt,47,payload_execution,53118,CreateThread,,,,
S0001_0001,DRO00011,persistence_registry_written,53,persistence_establishment,62203,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0001_0001,DRO00011,sandbox_vm_artefact_check,56,data_exfiltration,65213,DnsQuery_W,,,,
S0001_0002,BOT00012,exfil_dns_tunnel,0,sandbox_evasion_stall,8533,Sleep,,,,legitimate_tld
S0001_0002,BOT00012,sandbox_timing_check,9,sandbox_evasion_stall,29119,IsDebuggerPresent,,,,
S0001_0002,BOT00012,lateral_smb_spread,25,lateral_movement,31984,WMIExecMethod,,,known_c2_infra,
S0001_0002,BOT00012,persistence_registry_written,31,persistence_establishment,8353,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0001_0002,BOT00012,data_staged_for_exfil,37,data_exfiltration,46988,InternetOpenW,,/var/run/sample_9581.dll,,
S0001_0002,BOT00012,privilege_token_stolen,55,initial_drop,24801,WinExec,,,,
S0001_0002,BOT00012,av_signature_evaded,58,dormancy_dwell,64404,WaitForSingleObject,,,,
S0001_0003,BOT00013,self_delete_executed,13,self_destruct_cleanup,51105,RemoveDirectoryW,,C:\ProgramData\sample_8909.exe,,
S0001_0003,BOT00013,sandbox_timing_check,14,sandbox_evasion_stall,31646,Sleep,,,,
S0001_0003,BOT00013,self_delete_executed,20,self_destruct_cleanup,56939,RegDeleteKeyW,,/tmp/sample_2543.bat,,
S0001_0003,BOT00013,self_delete_executed,23,self_destruct_cleanup,19684,SHFileOperationW,,/var/run/sample_9757.bin,,
S0001_0003,BOT00013,dropper_executed,24,initial_drop,55257,WinExec,,C:\Windows\Temp\sample_8548.bat,,
S0001_0003,BOT00013,privilege_token_stolen,28,privilege_escalation,4168,OpenProcessToken,,,,
S0001_0003,BOT00013,heuristic_alert_triggered,41,sandbox_evasion_stall,50191,GetTickCount,,,,
S0001_0003,BOT00013,persistence_scheduled_task,53,self_destruct_cleanup,55605,DeleteFileW,,,,
S0001_0003,BOT00013,c2_beacon_sent,54,c2_communication,13924,recv,,,private_rfc1918,dga_generated
S0001_0003,BOT00013,persistence_registry_written,55,persistence_establishment,49089,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0001_0003,BOT00013,sandbox_timing_check,58,sandbox_evasion_stall,34455,Sleep,,,,
S0001_0004,BOT00014,sandbox_timing_check,0,sandbox_evasion_stall,57810,Sleep,,,,
S0001_0004,BOT00014,av_signature_evaded,1,dormancy_dwell,38313,SetTimer,,,,
S0001_0004,BOT00014,dropper_executed,4,initial_drop,5518,WinExec,,C:\ProgramData\sample_5699.bin,,
S0001_0004,BOT00014,payload_ransomware_encrypt,5,payload_execution,47153,WriteProcessMemory,,,,
S0001_0004,BOT00014,heuristic_alert_triggered,9,persistence_establishment,44863,CreateServiceW,,,,
S0001_0004,BOT00014,payload_ransomware_encrypt,28,payload_execution,38479,VirtualAllocEx,,,,
S0001_0004,BOT00014,data_staged_for_exfil,36,data_exfiltration,13731,InternetOpenW,,/tmp/sample_7643.ps1,,
S0001_0004,BOT00014,c2_beacon_sent,42,c2_communication,10458,WSAConnect,,,private_rfc1918,known_malicious
S0001_0004,BOT00014,av_signature_evaded,45,dormancy_dwell,35905,SetTimer,,,,
S0001_0004,BOT00014,data_staged_for_exfil,49,data_exfiltration,46229,DnsQuery_W,,C:\Users\Public\sample_6986.bin,,
S0001_0004,BOT00014,uac_bypass_attempted,50,dormancy_dwell,16455,WaitForSingleObject,,,,
S0001_0004,BOT00014,payload_ransomware_encrypt,55,payload_execution,34830,VirtualAllocEx,,,,
S0001_0005,BOT00015,lateral_smb_spread,6,lateral_movement,13486,CreateRemoteThread,,,private_rfc1918,
S0001_0005,BOT00015,self_delete_executed,13,self_destruct_cleanup,22482,RegDeleteKeyW,,C:\Windows\Temp\sample_4283.bin,,
S0001_0005,BOT00015,privilege_token_stolen,23,privilege_escalation,64899,OpenProcessToken,,,,
S0001_0005,BOT00015,dropper_executed,35,initial_drop,13613,CreateFileW,,C:\Users\Public\sample_5281.sh,,
S0001_0005,BOT00015,privilege_token_stolen,37,privilege_escalation,9228,BypassUAC,,,,
S0001_0005,BOT00015,av_signature_evaded,49,dormancy_dwell,13272,NtDelayExecution,,,,
S0001_0005,BOT00015,lateral_smb_spread,54,c2_communication,41700,WSAConnect,,,private_rfc1918,
S0001_0005,BOT00015,lateral_wmi_exec,57,privilege_escalation,57038,OpenProcessToken,,,,
S0001_0005,BOT00015,privilege_token_stolen,58,privilege_escalation,62764,ImpersonateLoggedOnUser,,,,
S0001_0006,FIL00016,sandbox_timing_check,16,sandbox_evasion_stall,38524,Sleep,,,,
S0001_0006,FIL00016,av_signature_evaded,29,dormancy_dwell,10379,NtDelayExecution,,,,
S0001_0006,FIL00016,sandbox_timing_check,34,sandbox_evasion_stall,32570,Sleep,,,,
S0001_0006,FIL00016,privilege_token_stolen,35,privilege_escalation,1069,AdjustTokenPrivileges,,,,
S0001_0006,FIL00016,dropper_executed,36,initial_drop,26474,CreateFileW,,C:\Windows\Temp\sample_4557.ps1,,
S0001_0006,FIL00016,data_staged_for_exfil,46,data_exfiltration,3945,send,,/home/user/.config/sample_5037.bin,,
S0001_0006,FIL00016,self_delete_executed,56,self_destruct_cleanup,26256,RemoveDirectoryW,,C:\ProgramData\sample_7248.exe,,
S0001_0006,FIL00016,payload_ransomware_encrypt,59,payload_execution,54467,CreateThread,,,,
S0001_0007,TRO00017,payload_ransomware_encrypt,1,payload_execution,34351,WriteProcessMemory,,,,
S0001_0007,TRO00017,persistence_registry_written,9,persistence_establishment,50773,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0001_0007,TRO00017,lateral_smb_spread,19,lateral_movement,3311,CreateRemoteThread,,,legitimate_cloud,
S0001_0007,TRO00017,sandbox_vm_artefact_check,26,initial_drop,48540,WriteFile,,,,
S0001_0007,TRO00017,heuristic_alert_triggered,31,privilege_escalation,41357,AdjustTokenPrivileges,,,,
S0001_0007,TRO00017,privilege_token_stolen,36,privilege_escalation,47700,BypassUAC,,,,
S0001_0007,TRO00017,persistence_registry_written,41,persistence_establishment,54719,CreateServiceW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0001_0007,TRO00017,data_staged_for_exfil,43,data_exfiltration,23381,send,,/tmp/sample_2187.sh,,
S0001_0007,TRO00017,self_delete_executed,45,self_destruct_cleanup,61082,SHFileOperationW,,/tmp/sample_2162.bat,,
S0001_0007,TRO00017,persistence_registry_written,47,persistence_establishment,4256,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0001_0007,TRO00017,anti_debug_triggered,49,lateral_movement,54075,NetShareEnum,,,,
S0001_0007,TRO00017,data_staged_for_exfil,51,data_exfiltration,32891,send,,C:\Users\Public\sample_7741.bat,,
S0001_0007,TRO00017,uac_bypass_attempted,56,payload_execution,4603,CreateThread,,,,
S0001_0008,APT00018,c2_command_received,2,privilege_escalation,59269,BypassUAC,,,private_rfc1918,
S0001_0008,APT00018,payload_cryptominer_spawned,3,dormancy_dwell,50244,GetSystemTime,,,,
S0001_0008,APT00018,payload_ransomware_encrypt,4,lateral_movement,12761,CreateRemoteThread,,,,
S0001_0008,APT00018,av_signature_evaded,16,dormancy_dwell,26820,NtDelayExecution,,,,
S0001_0008,APT00018,self_delete_executed,20,self_destruct_cleanup,39728,DeleteFileW,,C:\Windows\Temp\sample_1404.exe,,
S0001_0008,APT00018,dropper_executed,27,initial_drop,24891,CreateFileW,,/home/user/.config/sample_1707.dll,,
S0001_0008,APT00018,c2_command_received,30,data_exfiltration,21859,HttpSendRequestW,,,private_rfc1918,
S0001_0008,APT00018,heuristic_alert_triggered,31,lateral_movement,37387,CreateRemoteThread,,,,
S0001_0008,APT00018,av_signature_evaded,34,dormancy_dwell,48669,NtDelayExecution,,,,
S0001_0008,APT00018,payload_ransomware_encrypt,39,payload_execution,39070,CreateThread,,,,
S0001_0008,APT00018,payload_keylogger_active,48,lateral_movement,22028,CreateRemoteThread,,,,
S0001_0008,APT00018,sandbox_timing_check,56,sandbox_evasion_stall,20453,GetTickCount,,,,
S0001_0009,SPY00019,sandbox_timing_check,7,sandbox_evasion_stall,26500,CheckRemoteDebuggerPresent,,,,
S0001_0009,SPY00019,data_staged_for_exfil,32,data_exfiltration,62042,send,,C:\Windows\Temp\sample_4812.dll,,
S0001_0009,SPY00019,dropper_executed,41,initial_drop,9460,WriteFile,,/var/run/sample_3574.sh,,
S0001_0009,SPY00019,data_staged_for_exfil,42,data_exfiltration,5887,HttpSendRequestW,,C:\ProgramData\sample_1006.exe,,
S0001_0009,SPY00019,uac_bypass_attempted,47,payload_execution,3432,LoadLibraryA,,,,
S0001_0009,SPY00019,dropper_executed,50,initial_drop,13015,WinExec,,C:\Windows\Temp\sample_1926.ps1,,
S0002_0000,FIL00020,av_signature_evaded,2,persistence_establishment,47383,CreateServiceW,,,,
S0002_0000,FIL00020,av_signature_evaded,11,sandbox_evasion_stall,8438,IsDebuggerPresent,,,,
S0002_0000,FIL00020,heuristic_alert_triggered,13,payload_execution,15296,CreateThread,,,,
S0002_0000,FIL00020,lateral_smb_spread,34,lateral_movement,8983,NetShareEnum,,,legitimate_cloud,
S0002_0000,FIL00020,persistence_registry_written,38,persistence_establishment,2984,StartupFolder,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0002_0000,FIL00020,lateral_smb_spread,47,lateral_movement,46262,WMIExecMethod,,,private_rfc1918,
S0002_0000,FIL00020,persistence_registry_written,48,payload_execution,49811,VirtualAllocEx,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0002_0000,FIL00020,dropper_executed,49,initial_drop,11877,WriteFile,,C:\Users\Public\sample_7728.bin,,
S0002_0000,FIL00020,lateral_smb_spread,58,lateral_movement,12168,WMIExecMethod,,,private_rfc1918,
S0002_0001,WOR00021,data_staged_for_exfil,1,data_exfiltration,61922,HttpSendRequestW,,C:\Users\Public\sample_2297.bin,,
S0002_0001,WOR00021,data_staged_for_exfil,4,data_exfiltration,50618,DnsQuery_W,,C:\Windows\Temp\sample_6354.sh,,
S0002_0001,WOR00021,self_delete_executed,10,self_destruct_cleanup,50894,DeleteFileW,,/tmp/sample_4001.exe,,
S0002_0001,WOR00021,privilege_token_stolen,13,privilege_escalation,23578,AdjustTokenPrivileges,,,,
S0002_0001,WOR00021,privilege_token_stolen,16,privilege_escalation,17400,AdjustTokenPrivileges,,,,
S0002_0001,WOR00021,dropper_executed,23,initial_drop,39973,WriteFile,,C:\Windows\Temp\sample_2448.bin,,
S0002_0001,WOR00021,av_signature_evaded,27,dormancy_dwell,38442,NtDelayExecution,,,,
S0002_0001,WOR00021,payload_ransomware_encrypt,29,payload_execution,18430,CreateThread,,,,
S0002_0001,WOR00021,exfil_https_c2,32,self_destruct_cleanup,13923,RemoveDirectoryW,,,legitimate_cloud,
S0002_0001,WOR00021,av_signature_evaded,36,dormancy_dwell,24059,WaitForSingleObject,,,,
S0002_0001,WOR00021,persistence_registry_written,37,persistence_establishment,41424,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0002_0001,WOR00021,lateral_smb_spread,46,lateral_movement,3965,WMIExecMethod,,,cdn_provider,
S0002_0001,WOR00021,sandbox_timing_check,49,sandbox_evasion_stall,20691,GetTickCount,,,,
S0002_0001,WOR00021,data_staged_for_exfil,51,payload_execution,20146,WriteProcessMemory,,C:\Users\Public\sample_9656.bat,,
S0002_0001,WOR00021,data_staged_for_exfil,52,data_exfiltration,30583,InternetOpenW,,/var/run/sample_5471.bin,,
S0002_0001,WOR00021,dropper_executed,58,initial_drop,63997,WriteFile,,C:\Users\Public\sample_8180.sh,,
S0002_0002,TRO00022,c2_beacon_sent,7,c2_communication,50532,recv,,,tor_exit_node,subdomain_c2
S0002_0002,TRO00022,exfil_https_c2,8,self_destruct_cleanup,28997,RegDeleteKeyW,,,cdn_provider,
S0002_0002,TRO00022,exfil_https_c2,10,c2_communication,63707,recv,,,cdn_provider,
S0002_0002,TRO00022,data_staged_for_exfil,20,data_exfiltration,23212,send,,/tmp/sample_1351.bat,,
S0002_0002,TRO00022,data_staged_for_exfil,33,data_exfiltration,59381,send,,/var/run/sample_3193.sh,,
S0002_0002,TRO00022,persistence_registry_written,38,persistence_establishment,15879,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0002_0002,TRO00022,data_staged_for_exfil,40,data_exfiltration,14964,send,,C:\Windows\Temp\sample_8541.bat,,
S0002_0002,TRO00022,av_signature_evaded,45,dormancy_dwell,18706,GetSystemTime,,,,
S0002_0002,TRO00022,av_signature_evaded,57,dormancy_dwell,3190,SetTimer,,,,
S0002_0002,TRO00022,av_signature_evaded,58,initial_drop,21749,CreateFileW,,,,
S0002_0003,DRO00023,av_signature_evaded,4,dormancy_dwell,35460,GetSystemTime,,,,
S0002_0003,DRO00023,persistence_registry_written,17,persistence_establishment,60141,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0002_0003,DRO00023,persistence_registry_written,25,persistence_establishment,47445,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0002_0003,DRO00023,privilege_token_stolen,30,privilege_escalation,18127,AdjustTokenPrivileges,,,,
S0002_0003,DRO00023,data_staged_for_exfil,36,data_exfiltration,48133,HttpSendRequestW,,C:\Windows\Temp\sample_3011.ps1,,
S0002_0003,DRO00023,dropper_executed,44,initial_drop,36667,WinExec,,C:\Users\Public\sample_8379.exe,,
S0002_0003,DRO00023,sandbox_timing_check,57,sandbox_evasion_stall,15822,CheckRemoteDebuggerPresent,,,,
S0002_0004,BOT00024,av_signature_evaded,2,dormancy_dwell,23842,SetTimer,,,,
S0002_0004,BOT00024,av_signature_evaded,4,lateral_movement,36520,WNetAddConnection2W,,,,
S0002_0004,BOT00024,privilege_token_stolen,13,privilege_escalation,18120,AdjustTokenPrivileges,,,,
S0002_0004,BOT00024,dropper_executed,22,initial_drop,58631,WriteFile,,/tmp/sample_7100.ps1,,
S0002_0004,BOT00024,self_delete_executed,31,self_destruct_cleanup,35226,RegDeleteKeyW,,C:\ProgramData\sample_2016.exe,,
S0002_0004,BOT00024,dropper_executed,33,initial_drop,33708,CreateFileW,,/home/user/.config/sample_1956.dll,,
S0002_0004,BOT00024,payload_ransomware_encrypt,41,self_destruct_cleanup,35498,RegDeleteKeyW,,,,
S0002_0004,BOT00024,data_staged_for_exfil,43,data_exfiltration,49464,send,,/tmp/sample_8468.sh,,
S0002_0004,BOT00024,c2_beacon_sent,55,c2_communication,57767,InternetReadFile,,,private_rfc1918,recently_registered
S0002_0004,BOT00024,sandbox_timing_check,59,sandbox_evasion_stall,11252,IsDebuggerPresent,,,,
S0002_0005,CRY00025,privilege_token_stolen,0,privilege_escalation,32205,ImpersonateLoggedOnUser,,,,
S0002_0005,CRY00025,c2_beacon_sent,1,c2_communication,46434,recv,,,private_rfc1918,known_malicious
S0002_0005,CRY00025,sandbox_timing_check,2,sandbox_evasion_stall,17627,GetTickCount,,,,
S0002_0005,CRY00025,self_delete_executed,11,self_destruct_cleanup,27255,SHFileOperationW,,C:\Windows\Temp\sample_1031.bin,,
S0002_0005,CRY00025,persistence_scheduled_task,36,persistence_establishment,19005,RegSetValueExW,,,,
S0002_0005,CRY00025,uac_bypass_attempted,42,dormancy_dwell,60618,GetSystemTime,,,,
S0002_0005,CRY00025,data_staged_for_exfil,57,data_exfiltration,12029,DnsQuery_W,,/var/run/sample_3721.bat,,
S0002_0006,SPY00026,c2_command_received,9,sandbox_evasion_stall,1367,Sleep,,,tor_exit_node,
S0002_0006,SPY00026,privilege_token_stolen,16,lateral_movement,65065,WNetAddConnection2W,,,,
S0002_0006,SPY00026,av_signature_evaded,18,dormancy_dwell,11548,NtDelayExecution,,,,
S0002_0006,SPY00026,sandbox_timing_check,23,sandbox_evasion_stall,56140,IsDebuggerPresent,,,,
S0002_0006,SPY00026,dll_sideloading_executed,43,persistence_establishment,62447,SchtasksCreate,,/home/user/.config/sample_9073.bat,,
S0002_0006,SPY00026,payload_ransomware_encrypt,47,payload_execution,12809,CreateThread,,,,
S0002_0007,APT00027,privilege_token_stolen,1,privilege_escalation,30854,ImpersonateLoggedOnUser,,,,
S0002_0007,APT00027,av_signature_evaded,15,dormancy_dwell,9996,WaitForSingleObject,,,,
S0002_0007,APT00027,lateral_smb_spread,17,lateral_movement,36760,WMIExecMethod,,,legitimate_cloud,
S0002_0007,APT00027,lateral_smb_spread,21,c2_communication,33725,connect,,,unknown_public,
S0002_0007,APT00027,av_signature_evaded,22,sandbox_evasion_stall,32069,Sleep,,,,
S0002_0007,APT00027,dropper_executed,28,initial_drop,41710,WriteFile,,C:\Windows\Temp\sample_2058.sh,,
S0002_0007,APT00027,data_staged_for_exfil,35,payload_execution,17623,CreateThread,,C:\ProgramData\sample_4834.bat,,
S0002_0007,APT00027,self_delete_executed,40,self_destruct_cleanup,35813,DeleteFileW,,/tmp/sample_4298.bin,,
S0002_0007,APT00027,data_staged_for_exfil,42,data_exfiltration,63086,InternetOpenW,,C:\ProgramData\sample_4123.exe,,
S0002_0007,APT00027,dropper_executed,44,initial_drop,28263,WinExec,,/home/user/.config/sample_5183.ps1,,
S0002_0007,APT00027,av_signature_evaded,48,dormancy_dwell,24201,WaitForSingleObject,,,,
S0002_0007,APT00027,data_staged_for_exfil,51,data_exfiltration,27436,HttpSendRequestW,,/tmp/sample_9762.exe,,
S0002_0008,FIL00028,payload_ransomware_encrypt,4,payload_execution,18300,VirtualAllocEx,,,,
S0002_0008,FIL00028,lateral_smb_spread,8,lateral_movement,46620,CreateRemoteThread,,,unknown_public,
S0002_0008,FIL00028,lateral_smb_spread,9,c2_communication,36663,WSAConnect,,,cdn_provider,
S0002_0008,FIL00028,sandbox_vm_artefact_check,26,sandbox_evasion_stall,20684,CheckRemoteDebuggerPresent,,,,
S0002_0008,FIL00028,dll_sideloading_executed,30,data_exfiltration,29487,DnsQuery_W,,C:\ProgramData\sample_2432.exe,,
S0002_0008,FIL00028,privilege_token_stolen,34,c2_communication,34179,connect,,,,
S0002_0008,FIL00028,sandbox_timing_check,41,sandbox_evasion_stall,45875,Sleep,,,,
S0002_0008,FIL00028,c2_beacon_sent,42,c2_communication,48079,WSAConnect,,,known_c2_infra,legitimate_tld
S0002_0008,FIL00028,self_delete_executed,53,self_destruct_cleanup,17360,SHFileOperationW,,C:\Windows\Temp\sample_2300.sh,,
S0002_0008,FIL00028,payload_ransomware_encrypt,55,payload_execution,8227,CreateThread,,,,
S0002_0008,FIL00028,self_delete_executed,57,self_destruct_cleanup,11820,DeleteFileW,,/home/user/.config/sample_7023.ps1,,
S0002_0009,SPY00029,data_staged_for_exfil,7,data_exfiltration,62121,HttpSendRequestW,,/var/run/sample_3533.dll,,
S0002_0009,SPY00029,self_delete_executed,17,self_destruct_cleanup,44951,DeleteFileW,,/var/run/sample_1180.bat,,
S0002_0009,SPY00029,dropper_executed,27,initial_drop,65099,WriteFile,,/home/user/.config/sample_5429.ps1,,
S0002_0009,SPY00029,payload_ransomware_encrypt,29,payload_execution,1197,CreateThread,,,,
S0002_0009,SPY00029,payload_cryptominer_spawned,32,data_exfiltration,41083,HttpSendRequestW,,,,
S0002_0009,SPY00029,sandbox_timing_check,40,sandbox_evasion_stall,52405,IsDebuggerPresent,,,,
S0002_0009,SPY00029,lateral_smb_spread,48,lateral_movement,44481,NetShareEnum,,,legitimate_cloud,
S0002_0009,SPY00029,payload_ransomware_encrypt,52,payload_execution,62705,CreateThread,,,,
S0002_0009,SPY00029,persistence_registry_written,57,persistence_establishment,20184,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0003_0000,SPY00030,av_signature_evaded,6,dormancy_dwell,2646,GetSystemTime,,,,
S0003_0000,SPY00030,lateral_smb_spread,21,lateral_movement,50968,WMIExecMethod,,,cdn_provider,
S0003_0000,SPY00030,persistence_scheduled_task,27,privilege_escalation,43434,BypassUAC,,,,
S0003_0000,SPY00030,c2_beacon_sent,32,c2_communication,56649,WSAConnect,,,private_rfc1918,legitimate_tld
S0003_0000,SPY00030,persistence_registry_written,39,persistence_establishment,13247,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0003_0000,SPY00030,data_staged_for_exfil,43,data_exfiltration,61186,send,,C:\Users\Public\sample_1373.bat,,
S0003_0000,SPY00030,sandbox_timing_check,51,sandbox_evasion_stall,23421,GetTickCount,,,,
S0003_0000,SPY00030,av_signature_evaded,55,dormancy_dwell,15961,GetSystemTime,,,,
S0003_0000,SPY00030,payload_ransomware_encrypt,58,payload_execution,17289,CreateThread,,,,
S0003_0001,ROO00031,dropper_executed,2,initial_drop,28245,CreateFileW,,C:\Windows\Temp\sample_4273.exe,,
S0003_0001,ROO00031,persistence_registry_written,18,persistence_establishment,63606,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0003_0001,ROO00031,payload_ransomware_encrypt,21,payload_execution,27272,WriteProcessMemory,,,,
S0003_0001,ROO00031,dropper_executed,34,initial_drop,49201,ShellExecuteW,,C:\Users\Public\sample_7980.dll,,
S0003_0001,ROO00031,privilege_token_stolen,35,privilege_escalation,11320,OpenProcessToken,,,,
S0003_0001,ROO00031,privilege_token_stolen,42,data_exfiltration,39741,InternetOpenW,,,,
S0003_0001,ROO00031,sandbox_vm_artefact_check,54,lateral_movement,54183,NetShareEnum,,,,
S0003_0001,ROO00031,c2_beacon_sent,56,c2_communication,46065,InternetReadFile,,,cdn_provider,known_malicious
S0003_0001,ROO00031,av_signature_evaded,57,privilege_escalation,15266,AdjustTokenPrivileges,,,,
S0003_0002,RAN00032,payload_ransomware_encrypt,6,payload_execution,38404,LoadLibraryA,,,,
S0003_0002,RAN00032,sandbox_timing_check,10,sandbox_evasion_stall,59216,CheckRemoteDebuggerPresent,,,,
S0003_0002,RAN00032,c2_beacon_sent,11,c2_communication,40606,InternetReadFile,,,legitimate_cloud,dga_generated
S0003_0002,RAN00032,self_delete_executed,24,self_destruct_cleanup,15703,SHFileOperationW,,C:\Users\Public\sample_7202.sh,,
S0003_0002,RAN00032,sandbox_timing_check,35,sandbox_evasion_stall,62138,CheckRemoteDebuggerPresent,,,,
S0003_0002,RAN00032,lateral_smb_spread,40,lateral_movement,52179,CreateRemoteThread,,,known_c2_infra,
S0003_0002,RAN00032,c2_beacon_sent,41,persistence_establishment,28742,SchtasksCreate,,,cdn_provider,known_malicious
S0003_0002,RAN00032,privilege_token_stolen,42,privilege_escalation,41073,ImpersonateLoggedOnUser,,,,
S0003_0002,RAN00032,exfil_https_c2,48,self_destruct_cleanup,4673,SHFileOperationW,,,cdn_provider,
S0003_0002,RAN00032,self_delete_executed,53,self_destruct_cleanup,15389,DeleteFileW,,C:\ProgramData\sample_9097.sh,,
S0003_0002,RAN00032,lateral_smb_spread,55,lateral_movement,56066,WMIExecMethod,,,cdn_provider,
S0003_0002,RAN00032,payload_ransomware_encrypt,58,payload_execution,57614,LoadLibraryA,,,,
S0003_0003,FIL00033,payload_keylogger_active,4,lateral_movement,33152,WNetAddConnection2W,,,,
S0003_0003,FIL00033,data_staged_for_exfil,5,data_exfiltration,42764,HttpSendRequestW,,/home/user/.config/sample_7138.exe,,
S0003_0003,FIL00033,dropper_executed,10,initial_drop,29839,WinExec,,/tmp/sample_6430.dll,,
S0003_0003,FIL00033,anti_debug_triggered,13,dormancy_dwell,20976,WaitForSingleObject,,,,
S0003_0003,FIL00033,exfil_https_c2,17,persistence_establishment,25272,CreateServiceW,,,cdn_provider,
S0003_0003,FIL00033,persistence_registry_written,26,persistence_establishment,54925,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0003_0003,FIL00033,av_signature_evaded,27,c2_communication,23790,InternetReadFile,,,,
S0003_0003,FIL00033,av_signature_evaded,43,initial_drop,56861,CreateFileW,,,,
S0003_0003,FIL00033,data_staged_for_exfil,53,data_exfiltration,5389,DnsQuery_W,,/var/run/sample_2195.dll,,
S0003_0003,FIL00033,privilege_token_stolen,59,lateral_movement,21248,CreateRemoteThread,,,,
S0003_0004,APT00034,persistence_registry_written,7,persistence_establishment,59131,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0003_0004,APT00034,sandbox_timing_check,9,sandbox_evasion_stall,54763,IsDebuggerPresent,,,,
S0003_0004,APT00034,data_staged_for_exfil,10,data_exfiltration,4156,HttpSendRequestW,,/home/user/.config/sample_9971.ps1,,
S0003_0004,APT00034,c2_beacon_sent,19,c2_communication,27811,InternetReadFile,,,cdn_provider,known_malicious
S0003_0004,APT00034,privilege_token_stolen,20,privilege_escalation,41563,OpenProcessToken,,,,
S0003_0004,APT00034,definitive_detection,24,privilege_escalation,48182,ImpersonateLoggedOnUser,,,,
S0003_0004,APT00034,persistence_registry_written,26,persistence_establishment,37320,CreateServiceW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0003_0004,APT00034,lateral_smb_spread,34,lateral_movement,64133,NetShareEnum,,,known_c2_infra,
S0003_0004,APT00034,self_delete_executed,35,self_destruct_cleanup,44743,SHFileOperationW,,C:\Users\Public\sample_6672.bin,,
S0003_0004,APT00034,data_staged_for_exfil,36,dormancy_dwell,58129,SetTimer,,C:\Windows\Temp\sample_4728.bat,,
S0003_0004,APT00034,dll_sideloading_executed,38,lateral_movement,8749,WNetAddConnection2W,,/tmp/sample_6769.ps1,,
S0003_0004,APT00034,sandbox_timing_check,39,sandbox_evasion_stall,44613,IsDebuggerPresent,,,,
S0003_0004,APT00034,c2_beacon_sent,54,c2_communication,37989,InternetReadFile,,,private_rfc1918,known_malicious
S0003_0005,RAN00035,c2_beacon_sent,2,c2_communication,30176,recv,,,cdn_provider,dga_generated
S0003_0005,RAN00035,c2_beacon_sent,25,c2_communication,21422,InternetReadFile,,,legitimate_cloud,legitimate_tld
S0003_0005,RAN00035,privilege_token_stolen,33,privilege_escalation,40272,OpenProcessToken,,,,
S0003_0005,RAN00035,privilege_token_stolen,36,payload_execution,35905,LoadLibraryA,,,,
S0003_0005,RAN00035,privilege_token_stolen,37,privilege_escalation,36873,AdjustTokenPrivileges,,,,
S0003_0005,RAN00035,self_delete_executed,39,self_destruct_cleanup,62564,RegDeleteKeyW,,C:\Users\Public\sample_1320.bin,,
S0003_0006,APT00036,privilege_token_stolen,3,privilege_escalation,10843,OpenProcessToken,,,,
S0003_0006,APT00036,data_staged_for_exfil,4,data_exfiltration,11600,DnsQuery_W,,/tmp/sample_9697.bat,,
S0003_0006,APT00036,c2_beacon_sent,6,c2_communication,38240,InternetReadFile,,,known_c2_infra,legitimate_tld
S0003_0006,APT00036,payload_ransomware_encrypt,8,payload_execution,53113,CreateThread,,,,
S0003_0006,APT00036,uac_bypass_attempted,10,initial_drop,30746,CreateFileW,,,,
S0003_0006,APT00036,persistence_registry_written,17,persistence_establishment,14153,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0003_0006,APT00036,av_signature_evaded,37,dormancy_dwell,30430,SetTimer,,,,
S0003_0006,APT00036,sandbox_timing_check,41,sandbox_evasion_stall,31077,CheckRemoteDebuggerPresent,,,,
S0003_0006,APT00036,payload_ransomware_encrypt,42,dormancy_dwell,48649,NtDelayExecution,,,,
S0003_0006,APT00036,exfil_https_c2,48,persistence_establishment,28959,RegSetValueExW,,,private_rfc1918,
S0003_0006,APT00036,anti_debug_triggered,50,lateral_movement,8727,NetShareEnum,,,,
S0003_0006,APT00036,payload_cryptominer_spawned,52,self_destruct_cleanup,20434,SHFileOperationW,,,,
S0003_0006,APT00036,data_staged_for_exfil,53,data_exfiltration,42441,HttpSendRequestW,,C:\Users\Public\sample_1700.ps1,,
S0003_0006,APT00036,sandbox_timing_check,59,sandbox_evasion_stall,37015,Sleep,,,,
S0003_0007,APT00037,exfil_https_c2,1,c2_communication,59689,recv,,,known_c2_infra,
S0003_0007,APT00037,c2_beacon_sent,17,c2_communication,53172,connect,,,tor_exit_node,legitimate_tld
S0003_0007,APT00037,self_delete_executed,20,self_destruct_cleanup,27145,SHFileOperationW,,/var/run/sample_7800.sh,,
S0003_0007,APT00037,privilege_token_stolen,24,privilege_escalation,63623,OpenProcessToken,,,,
S0003_0007,APT00037,payload_ransomware_encrypt,29,payload_execution,30227,CreateThread,,,,
S0003_0007,APT00037,sandbox_timing_check,37,sandbox_evasion_stall,57491,GetTickCount,,,,
S0003_0007,APT00037,data_staged_for_exfil,44,payload_execution,64918,WriteProcessMemory,,/home/user/.config/sample_7162.dll,,
S0003_0007,APT00037,sandbox_timing_check,54,sandbox_evasion_stall,58696,GetTickCount,,,,
S0003_0007,APT00037,anti_debug_triggered,56,initial_drop,2073,ShellExecuteW,,,,
S0003_0007,APT00037,dropper_executed,57,initial_drop,35728,WinExec,,C:\Windows\Temp\sample_8543.bin,,
S0003_0008,ROO00038,sandbox_timing_check,0,sandbox_evasion_stall,48512,GetTickCount,,,,
S0003_0008,ROO00038,c2_beacon_sent,2,c2_communication,47681,InternetReadFile,,,legitimate_cloud,recently_registered
S0003_0008,ROO00038,c2_beacon_sent,6,c2_communication,33280,WSAConnect,,,unknown_public,subdomain_c2
S0003_0008,ROO00038,c2_beacon_sent,11,c2_communication,8549,InternetReadFile,,,cdn_provider,legitimate_tld
S0003_0008,ROO00038,c2_beacon_sent,21,c2_communication,36684,recv,,,known_c2_infra,dga_generated
S0003_0008,ROO00038,dropper_executed,25,initial_drop,17801,ShellExecuteW,,C:\Users\Public\sample_7882.exe,,
S0003_0008,ROO00038,payload_ransomware_encrypt,27,payload_execution,4142,WriteProcessMemory,,,,
S0003_0008,ROO00038,privilege_token_stolen,29,privilege_escalation,43992,BypassUAC,,,,
S0003_0008,ROO00038,lateral_smb_spread,31,lateral_movement,39403,CreateRemoteThread,,,unknown_public,
S0003_0008,ROO00038,payload_ransomware_encrypt,32,payload_execution,26526,CreateThread,,,,
S0003_0008,ROO00038,sandbox_vm_artefact_check,35,persistence_establishment,45100,StartupFolder,,,,
S0003_0008,ROO00038,c2_beacon_sent,38,c2_communication,5475,WSAConnect,,,private_rfc1918,dga_generated
S0003_0008,ROO00038,data_staged_for_exfil,39,data_exfiltration,50861,HttpSendRequestW,,C:\Windows\Temp\sample_6026.exe,,
S0003_0008,ROO00038,payload_ransomware_encrypt,42,payload_execution,56474,VirtualAllocEx,,,,
S0003_0008,ROO00038,sandbox_timing_check,49,sandbox_evasion_stall,21361,GetTickCount,,,,
S0003_0008,ROO00038,dropper_executed,50,initial_drop,7785,WriteFile,,C:\ProgramData\sample_1515.dll,,
S0003_0009,CRY00039,av_signature_evaded,2,dormancy_dwell,47537,SetTimer,,,,
S0003_0009,CRY00039,c2_beacon_sent,10,c2_communication,47566,InternetReadFile,,,cdn_provider,known_malicious
S0003_0009,CRY00039,sandbox_timing_check,21,sandbox_evasion_stall,53369,Sleep,,,,
S0003_0009,CRY00039,exfil_https_c2,24,self_destruct_cleanup,19153,DeleteFileW,,,legitimate_cloud,
S0003_0009,CRY00039,persistence_registry_written,27,persistence_establishment,63185,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0003_0009,CRY00039,self_delete_executed,31,self_destruct_cleanup,44785,RegDeleteKeyW,,/var/run/sample_9065.exe,,
S0003_0009,CRY00039,privilege_token_stolen,34,privilege_escalation,48305,BypassUAC,,,,
S0003_0009,CRY00039,data_staged_for_exfil,42,data_exfiltration,5790,DnsQuery_W,,C:\ProgramData\sample_4572.sh,,
S0003_0009,CRY00039,c2_beacon_sent,43,c2_communication,50376,recv,,,legitimate_cloud,legitimate_tld
S0003_0009,CRY00039,sandbox_timing_check,48,sandbox_evasion_stall,14353,Sleep,,,,
S0003_0009,CRY00039,data_staged_for_exfil,54,data_exfiltration,35454,DnsQuery_W,,/home/user/.config/sample_8556.sh,,
S0004_0000,TRO00040,lateral_smb_spread,12,lateral_movement,64850,WMIExecMethod,,,known_c2_infra,
S0004_0000,TRO00040,privilege_token_stolen,21,privilege_escalation,31279,ImpersonateLoggedOnUser,,,,
S0004_0000,TRO00040,sandbox_timing_check,29,sandbox_evasion_stall,28564,GetTickCount,,,,
S0004_0000,TRO00040,av_signature_evaded,38,dormancy_dwell,22222,NtDelayExecution,,,,
S0004_0000,TRO00040,c2_beacon_sent,50,c2_communication,27569,WSAConnect,,,known_c2_infra,subdomain_c2
S0004_0000,TRO00040,sandbox_timing_check,51,sandbox_evasion_stall,7389,IsDebuggerPresent,,,,
S0004_0001,BOT00041,persistence_registry_written,3,persistence_establishment,27733,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0004_0001,BOT00041,self_delete_executed,7,self_destruct_cleanup,59658,SHFileOperationW,,C:\ProgramData\sample_7049.exe,,
S0004_0001,BOT00041,payload_ransomware_encrypt,13,payload_execution,60520,WriteProcessMemory,,,,
S0004_0001,BOT00041,self_delete_executed,16,self_destruct_cleanup,2765,DeleteFileW,,/tmp/sample_9007.exe,,
S0004_0001,BOT00041,c2_beacon_sent,25,c2_communication,38036,recv,,,legitimate_cloud,legitimate_tld
S0004_0001,BOT00041,persistence_registry_written,30,persistence_establishment,4889,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0004_0001,BOT00041,payload_ransomware_encrypt,32,payload_execution,32710,LoadLibraryA,,,,
S0004_0001,BOT00041,payload_cryptominer_spawned,36,persistence_establishment,2581,SchtasksCreate,,,,
S0004_0001,BOT00041,persistence_scheduled_task,38,lateral_movement,26471,NetShareEnum,,,,
S0004_0001,BOT00041,dropper_executed,41,initial_drop,6169,ShellExecuteW,,/var/run/sample_4136.ps1,,
S0004_0001,BOT00041,lateral_smb_spread,45,lateral_movement,53828,CreateRemoteThread,,,private_rfc1918,
S0004_0001,BOT00041,persistence_registry_written,51,persistence_establishment,2890,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0004_0001,BOT00041,c2_beacon_sent,52,c2_communication,55374,recv,,,private_rfc1918,recently_registered
S0004_0002,BOT00042,self_delete_executed,0,self_destruct_cleanup,11178,RegDeleteKeyW,,/tmp/sample_1309.bin,,
S0004_0002,BOT00042,data_staged_for_exfil,2,data_exfiltration,42724,HttpSendRequestW,,C:\Windows\Temp\sample_6095.ps1,,
S0004_0002,BOT00042,self_delete_executed,3,self_destruct_cleanup,41971,DeleteFileW,,C:\Windows\Temp\sample_5836.exe,,
S0004_0002,BOT00042,privilege_token_stolen,8,privilege_escalation,24585,OpenProcessToken,,,,
S0004_0002,BOT00042,lateral_smb_spread,15,lateral_movement,53020,WNetAddConnection2W,,,legitimate_cloud,
S0004_0002,BOT00042,data_staged_for_exfil,16,data_exfiltration,64799,InternetOpenW,,/var/run/sample_9456.ps1,,
S0004_0002,BOT00042,c2_command_received,18,self_destruct_cleanup,3575,DeleteFileW,,,cdn_provider,
S0004_0002,BOT00042,privilege_token_stolen,27,privilege_escalation,65356,OpenProcessToken,,,,
S0004_0002,BOT00042,c2_beacon_sent,28,c2_communication,58476,connect,,,cdn_provider,dga_generated
S0004_0002,BOT00042,av_signature_evaded,31,dormancy_dwell,62476,NtDelayExecution,,,,
S0004_0002,BOT00042,data_staged_for_exfil,33,sandbox_evasion_stall,27910,GetTickCount,,/var/run/sample_9585.bat,,
S0004_0002,BOT00042,lateral_smb_spread,38,lateral_movement,25315,CreateRemoteThread,,,known_c2_infra,
S0004_0002,BOT00042,privilege_token_stolen,52,privilege_escalation,25555,AdjustTokenPrivileges,,,,
S0004_0002,BOT00042,lateral_smb_spread,54,lateral_movement,49532,CreateRemoteThread,,,cdn_provider,
S0004_0002,BOT00042,c2_beacon_sent,57,c2_communication,32848,InternetReadFile,,,tor_exit_node,recently_registered
S0004_0003,WOR00043,c2_beacon_sent,9,c2_communication,35603,InternetReadFile,,,known_c2_infra,legitimate_tld
S0004_0003,WOR00043,c2_beacon_sent,23,c2_communication,30168,InternetReadFile,,,cdn_provider,subdomain_c2
S0004_0003,WOR00043,dropper_executed,52,initial_drop,52976,ShellExecuteW,,/var/run/sample_1446.exe,,
S0004_0004,RAN00044,persistence_registry_written,11,persistence_establishment,32676,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0004_0004,RAN00044,privilege_token_stolen,20,privilege_escalation,34369,OpenProcessToken,,,,
S0004_0004,RAN00044,anti_debug_triggered,34,payload_execution,7377,LoadLibraryA,,,,
S0004_0004,RAN00044,persistence_registry_written,40,persistence_establishment,20389,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0004_0004,RAN00044,av_signature_evaded,47,dormancy_dwell,48025,SetTimer,,,,
S0004_0004,RAN00044,data_staged_for_exfil,54,data_exfiltration,41292,DnsQuery_W,,/home/user/.config/sample_6397.sh,,
S0004_0005,DRO00045,persistence_registry_written,3,payload_execution,25302,CreateThread,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0004_0005,DRO00045,privilege_token_stolen,4,privilege_escalation,40017,ImpersonateLoggedOnUser,,,,
S0004_0005,DRO00045,payload_ransomware_encrypt,5,payload_execution,24640,CreateThread,,,,
S0004_0005,DRO00045,data_staged_for_exfil,11,data_exfiltration,10726,send,,/tmp/sample_4228.exe,,
S0004_0005,DRO00045,privilege_token_stolen,27,privilege_escalation,16532,BypassUAC,,,,
S0004_0005,DRO00045,self_delete_executed,33,self_destruct_cleanup,18935,RemoveDirectoryW,,/home/user/.config/sample_1882.ps1,,
S0004_0005,DRO00045,lateral_smb_spread,41,lateral_movement,33749,WMIExecMethod,,,private_rfc1918,
S0004_0005,DRO00045,exfil_https_c2,43,payload_execution,42639,VirtualAllocEx,,,unknown_public,
S0004_0005,DRO00045,heuristic_alert_triggered,52,lateral_movement,19096,CreateRemoteThread,,,,
S0004_0005,DRO00045,uac_bypass_attempted,56,lateral_movement,52522,NetShareEnum,,,,
S0004_0005,DRO00045,anti_debug_triggered,59,privilege_escalation,3342,ImpersonateLoggedOnUser,,,,
S0004_0006,SPY00046,dropper_executed,4,initial_drop,59318,WriteFile,,C:\ProgramData\sample_6017.bat,,
S0004_0006,SPY00046,sandbox_timing_check,6,sandbox_evasion_stall,1472,Sleep,,,,
S0004_0006,SPY00046,uac_bypass_attempted,9,sandbox_evasion_stall,60267,GetTickCount,,,,
S0004_0006,SPY00046,anti_debug_triggered,12,data_exfiltration,24540,HttpSendRequestW,,,,
S0004_0006,SPY00046,c2_beacon_sent,15,c2_communication,56163,WSAConnect,,,private_rfc1918,recently_registered
S0004_0006,SPY00046,exfil_dns_tunnel,27,sandbox_evasion_stall,40828,CheckRemoteDebuggerPresent,,,,known_malicious
S0004_0006,SPY00046,payload_ransomware_encrypt,33,payload_execution,46850,WriteProcessMemory,,,,
S0004_0006,SPY00046,c2_beacon_sent,45,c2_communication,45911,connect,,,private_rfc1918,recently_registered
S0004_0006,SPY00046,sandbox_vm_artefact_check,49,sandbox_evasion_stall,53731,Sleep,,,,
S0004_0006,SPY00046,dropper_executed,53,initial_drop,5312,WinExec,,/var/run/sample_2296.exe,,
S0004_0006,SPY00046,payload_ransomware_encrypt,54,payload_execution,46122,LoadLibraryA,,,,
S0004_0006,SPY00046,persistence_registry_written,59,persistence_establishment,20280,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0004_0007,APT00047,lateral_smb_spread,11,lateral_movement,28367,WNetAddConnection2W,,,tor_exit_node,
S0004_0007,APT00047,c2_beacon_sent,13,c2_communication,30019,InternetReadFile,,,tor_exit_node,legitimate_tld
S0004_0007,APT00047,lateral_smb_spread,32,lateral_movement,43237,NetShareEnum,,,private_rfc1918,
S0004_0007,APT00047,data_staged_for_exfil,35,data_exfiltration,20822,InternetOpenW,,/tmp/sample_4545.ps1,,
S0004_0007,APT00047,av_signature_evaded,46,dormancy_dwell,43778,WaitForSingleObject,,,,
S0004_0007,APT00047,data_staged_for_exfil,48,data_exfiltration,14018,send,,/var/run/sample_3779.exe,,
S0004_0007,APT00047,payload_ransomware_encrypt,56,persistence_establishment,16952,SchtasksCreate,,,,
S0004_0008,CRY00048,data_staged_for_exfil,3,data_exfiltration,11406,send,,C:\ProgramData\sample_1074.dll,,
S0004_0008,CRY00048,c2_beacon_sent,22,c2_communication,58140,WSAConnect,,,cdn_provider,legitimate_tld
S0004_0008,CRY00048,dropper_executed,23,c2_communication,60114,WSAConnect,,C:\Users\Public\sample_8069.bat,,
S0004_0008,CRY00048,payload_ransomware_encrypt,24,payload_execution,62818,LoadLibraryA,,,,
S0004_0008,CRY00048,self_delete_executed,31,self_destruct_cleanup,25140,RemoveDirectoryW,,C:\Users\Public\sample_8825.bin,,
S0004_0008,CRY00048,lotl_binary_abused,32,initial_drop,51649,ShellExecuteW,,,,
S0004_0008,CRY00048,lotl_binary_abused,38,payload_execution,26989,CreateThread,,,,
S0004_0008,CRY00048,payload_ransomware_encrypt,42,payload_execution,49794,WriteProcessMemory,,,,
S0004_0008,CRY00048,lateral_smb_spread,55,lateral_movement,52375,WMIExecMethod,,,legitimate_cloud,
S0004_0009,BOT00049,sandbox_timing_check,16,sandbox_evasion_stall,27628,Sleep,,,,
S0004_0009,BOT00049,persistence_registry_written,26,persistence_establishment,45025,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0004_0009,BOT00049,process_hollowing_executed,29,self_destruct_cleanup,13207,DeleteFileW,,,,
S0004_0009,BOT00049,lateral_smb_spread,32,dormancy_dwell,37678,GetSystemTime,,,private_rfc1918,
S0004_0009,BOT00049,data_staged_for_exfil,34,data_exfiltration,57950,DnsQuery_W,,/tmp/sample_9885.exe,,
S0004_0009,BOT00049,c2_beacon_sent,40,c2_communication,25145,recv,,,private_rfc1918,legitimate_tld
S0004_0009,BOT00049,persistence_registry_written,42,persistence_establishment,65496,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0004_0009,BOT00049,sandbox_timing_check,44,sandbox_evasion_stall,42488,GetTickCount,,,,
S0004_0009,BOT00049,av_signature_evaded,51,dormancy_dwell,54252,WaitForSingleObject,,,,
S0004_0009,BOT00049,self_delete_executed,54,self_destruct_cleanup,64616,DeleteFileW,,/home/user/.config/sample_1466.ps1,,
S0004_0009,BOT00049,payload_keylogger_active,55,self_destruct_cleanup,26391,SHFileOperationW,,,,
S0004_0009,BOT00049,payload_ransomware_encrypt,58,privilege_escalation,63867,ImpersonateLoggedOnUser,,,,
S0005_0000,BOT00050,c2_beacon_sent,4,c2_communication,21469,connect,,,cdn_provider,dga_generated
S0005_0000,BOT00050,self_delete_executed,5,self_destruct_cleanup,51296,RemoveDirectoryW,,/var/run/sample_1578.bat,,
S0005_0000,BOT00050,dropper_executed,6,initial_drop,64750,WriteFile,,C:\Windows\Temp\sample_8676.bat,,
S0005_0000,BOT00050,anti_debug_triggered,8,sandbox_evasion_stall,25218,Sleep,,,,
S0005_0000,BOT00050,lateral_wmi_exec,11,initial_drop,19582,WriteFile,,,,
S0005_0000,BOT00050,sandbox_timing_check,12,sandbox_evasion_stall,9087,GetTickCount,,,,
S0005_0000,BOT00050,privilege_token_stolen,15,privilege_escalation,44841,ImpersonateLoggedOnUser,,,,
S0005_0000,BOT00050,exfil_https_c2,19,data_exfiltration,21132,send,,,private_rfc1918,
S0005_0000,BOT00050,persistence_registry_written,28,persistence_establishment,10107,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0005_0000,BOT00050,lateral_smb_spread,32,self_destruct_cleanup,40998,RemoveDirectoryW,,,cdn_provider,
S0005_0000,BOT00050,dropper_executed,36,initial_drop,32643,WinExec,,C:\Users\Public\sample_7797.bat,,
S0005_0000,BOT00050,data_staged_for_exfil,42,data_exfiltration,45066,send,,/home/user/.config/sample_9191.bin,,
S0005_0000,BOT00050,c2_beacon_sent,43,c2_communication,27868,WSAConnect,,,unknown_public,recently_registered
S0005_0000,BOT00050,definitive_detection,44,lateral_movement,1257,WNetAddConnection2W,,,,
S0005_0000,BOT00050,self_delete_executed,53,lateral_movement,54167,CreateRemoteThread,,/tmp/sample_5061.ps1,,
S0005_0001,TRO00051,av_signature_evaded,7,dormancy_dwell,51476,NtDelayExecution,,,,
S0005_0001,TRO00051,payload_ransomware_encrypt,10,payload_execution,59666,LoadLibraryA,,,,
S0005_0001,TRO00051,privilege_token_stolen,23,privilege_escalation,57128,BypassUAC,,,,
S0005_0001,TRO00051,lateral_smb_spread,24,lateral_movement,16170,WNetAddConnection2W,,,unknown_public,
S0005_0001,TRO00051,lateral_smb_spread,30,lateral_movement,5585,CreateRemoteThread,,,cdn_provider,
S0005_0001,TRO00051,c2_beacon_sent,32,c2_communication,48457,connect,,,tor_exit_node,legitimate_tld
S0005_0001,TRO00051,data_staged_for_exfil,33,data_exfiltration,50178,HttpSendRequestW,,C:\Windows\Temp\sample_6098.bat,,
S0005_0001,TRO00051,lateral_smb_spread,35,lateral_movement,42526,WMIExecMethod,,,known_c2_infra,
S0005_0001,TRO00051,payload_cryptominer_spawned,36,privilege_escalation,19473,ImpersonateLoggedOnUser,,,,
S0005_0001,TRO00051,dll_sideloading_executed,37,c2_communication,64380,InternetReadFile,,/home/user/.config/sample_6330.bin,,
S0005_0001,TRO00051,lateral_smb_spread,41,lateral_movement,58938,WMIExecMethod,,,tor_exit_node,
S0005_0001,TRO00051,lateral_smb_spread,42,lateral_movement,19175,WNetAddConnection2W,,,legitimate_cloud,
S0005_0001,TRO00051,data_staged_for_exfil,43,initial_drop,6411,ShellExecuteW,,/home/user/.config/sample_7217.exe,,
S0005_0001,TRO00051,exfil_dns_tunnel,48,c2_communication,19243,WSAConnect,,,,recently_registered
S0005_0001,TRO00051,privilege_token_stolen,52,privilege_escalation,9015,OpenProcessToken,,,,
S0005_0001,TRO00051,privilege_token_stolen,58,privilege_escalation,54002,BypassUAC,,,,
S0005_0001,TRO00051,lateral_smb_spread,59,lateral_movement,20694,WNetAddConnection2W,,,unknown_public,
S0005_0002,WOR00052,lateral_smb_spread,11,lateral_movement,11979,WNetAddConnection2W,,,private_rfc1918,
S0005_0002,WOR00052,av_signature_evaded,18,dormancy_dwell,16257,GetSystemTime,,,,
S0005_0002,WOR00052,self_delete_executed,26,self_destruct_cleanup,33679,DeleteFileW,,C:\Users\Public\sample_8384.bat,,
S0005_0002,WOR00052,sandbox_timing_check,29,sandbox_evasion_stall,39152,Sleep,,,,
S0005_0002,WOR00052,sandbox_timing_check,30,sandbox_evasion_stall,46273,Sleep,,,,
S0005_0002,WOR00052,payload_ransomware_encrypt,31,payload_execution,58567,WriteProcessMemory,,,,
S0005_0002,WOR00052,sandbox_timing_check,42,sandbox_evasion_stall,15124,GetTickCount,,,,
S0005_0002,WOR00052,data_staged_for_exfil,44,self_destruct_cleanup,54838,DeleteFileW,,C:\Users\Public\sample_2662.bat,,
S0005_0002,WOR00052,payload_ransomware_encrypt,45,payload_execution,57783,VirtualAllocEx,,,,
S0005_0002,WOR00052,privilege_token_stolen,59,privilege_escalation,38669,ImpersonateLoggedOnUser,,,,
S0005_0003,SPY00053,payload_ransomware_encrypt,9,privilege_escalation,59902,AdjustTokenPrivileges,,,,
S0005_0003,SPY00053,data_staged_for_exfil,11,data_exfiltration,33849,send,,C:\Windows\Temp\sample_3215.exe,,
S0005_0003,SPY00053,privilege_token_stolen,13,privilege_escalation,11350,OpenProcessToken,,,,
S0005_0003,SPY00053,self_delete_executed,20,self_destruct_cleanup,50238,SHFileOperationW,,C:\ProgramData\sample_8709.exe,,
S0005_0003,SPY00053,c2_beacon_sent,24,c2_communication,61223,recv,,,legitimate_cloud,legitimate_tld
S0005_0003,SPY00053,heuristic_alert_triggered,28,data_exfiltration,3912,DnsQuery_W,,,,
S0005_0003,SPY00053,dropper_executed,37,initial_drop,40166,CreateFileW,,C:\Users\Public\sample_7248.dll,,
S0005_0003,SPY00053,c2_beacon_sent,45,dormancy_dwell,58242,GetSystemTime,,,legitimate_cloud,legitimate_tld
S0005_0003,SPY00053,av_signature_evaded,47,dormancy_dwell,1823,WaitForSingleObject,,,,
S0005_0003,SPY00053,payload_ransomware_encrypt,49,payload_execution,45953,WriteProcessMemory,,,,
S0005_0003,SPY00053,lateral_smb_spread,57,dormancy_dwell,2315,NtDelayExecution,,,cdn_provider,
S0005_0004,SPY00054,anti_debug_triggered,1,privilege_escalation,26897,OpenProcessToken,,,,
S0005_0004,SPY00054,payload_ransomware_encrypt,3,persistence_establishment,8352,RegSetValueExW,,,,
S0005_0004,SPY00054,self_delete_executed,5,self_destruct_cleanup,41799,SHFileOperationW,,C:\ProgramData\sample_4227.bat,,
S0005_0004,SPY00054,sandbox_timing_check,19,sandbox_evasion_stall,23858,CheckRemoteDebuggerPresent,,,,
S0005_0004,SPY00054,persistence_registry_written,38,persistence_establishment,64407,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0005_0004,SPY00054,lateral_smb_spread,47,lateral_movement,60587,WNetAddConnection2W,,,known_c2_infra,
S0005_0004,SPY00054,av_signature_evaded,57,privilege_escalation,62279,BypassUAC,,,,
S0005_0004,SPY00054,process_hollowing_executed,58,dormancy_dwell,61237,GetSystemTime,,,,
S0005_0005,RAN00055,payload_ransomware_encrypt,8,payload_execution,33277,CreateThread,,,,
S0005_0005,RAN00055,data_staged_for_exfil,11,data_exfiltration,48214,send,,/var/run/sample_9865.bin,,
S0005_0005,RAN00055,data_staged_for_exfil,13,data_exfiltration,8155,InternetOpenW,,/home/user/.config/sample_6345.bin,,
S0005_0005,RAN00055,data_staged_for_exfil,18,data_exfiltration,47105,DnsQuery_W,,/tmp/sample_4303.sh,,
S0005_0005,RAN00055,av_signature_evaded,34,dormancy_dwell,53348,NtDelayExecution,,,,
S0005_0005,RAN00055,persistence_scheduled_task,38,data_exfiltration,51124,InternetOpenW,,,,
S0005_0005,RAN00055,sandbox_timing_check,42,sandbox_evasion_stall,22114,CheckRemoteDebuggerPresent,,,,
S0005_0005,RAN00055,lotl_binary_abused,44,persistence_establishment,12139,StartupFolder,,,,
S0005_0005,RAN00055,exfil_https_c2,45,c2_communication,44450,WSAConnect,,,private_rfc1918,
S0005_0005,RAN00055,payload_ransomware_encrypt,58,payload_execution,17181,LoadLibraryA,,,,
S0005_0006,FIL00056,lateral_smb_spread,3,lateral_movement,31739,NetShareEnum,,,legitimate_cloud,
S0005_0006,FIL00056,self_delete_executed,5,self_destruct_cleanup,55433,RemoveDirectoryW,,/var/run/sample_7277.sh,,
S0005_0006,FIL00056,lateral_smb_spread,10,persistence_establishment,20376,SchtasksCreate,,,private_rfc1918,
S0005_0006,FIL00056,av_signature_evaded,17,dormancy_dwell,44786,WaitForSingleObject,,,,
S0005_0006,FIL00056,persistence_registry_written,21,persistence_establishment,4617,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0005_0006,FIL00056,payload_keylogger_active,23,privilege_escalation,24784,ImpersonateLoggedOnUser,,,,
S0005_0006,FIL00056,payload_ransomware_encrypt,24,payload_execution,17523,LoadLibraryA,,,,
S0005_0006,FIL00056,sandbox_vm_artefact_check,25,sandbox_evasion_stall,16534,GetTickCount,,,,
S0005_0006,FIL00056,av_signature_evaded,28,dormancy_dwell,54508,NtDelayExecution,,,,
S0005_0006,FIL00056,privilege_token_stolen,51,privilege_escalation,64545,OpenProcessToken,,,,
S0005_0007,TRO00057,lotl_binary_abused,1,dormancy_dwell,6339,GetSystemTime,,,,
S0005_0007,TRO00057,lateral_smb_spread,16,lateral_movement,20011,CreateRemoteThread,,,known_c2_infra,
S0005_0007,TRO00057,av_signature_evaded,19,dormancy_dwell,35234,NtDelayExecution,,,,
S0005_0007,TRO00057,self_delete_executed,23,self_destruct_cleanup,8569,DeleteFileW,,/var/run/sample_5840.ps1,,
S0005_0007,TRO00057,exfil_https_c2,27,data_exfiltration,31557,HttpSendRequestW,,,legitimate_cloud,
S0005_0007,TRO00057,sandbox_timing_check,35,dormancy_dwell,52928,WaitForSingleObject,,,,
S0005_0007,TRO00057,dll_sideloading_executed,37,c2_communication,22678,InternetReadFile,,/home/user/.config/sample_3711.bin,,
S0005_0007,TRO00057,sandbox_timing_check,38,sandbox_evasion_stall,25655,IsDebuggerPresent,,,,
S0005_0007,TRO00057,c2_beacon_sent,43,c2_communication,27021,recv,,,legitimate_cloud,legitimate_tld
S0005_0008,BOT00058,data_staged_for_exfil,0,data_exfiltration,14416,DnsQuery_W,,C:\Users\Public\sample_8403.bin,,
S0005_0008,BOT00058,av_signature_evaded,2,dormancy_dwell,50585,WaitForSingleObject,,,,
S0005_0008,BOT00058,self_delete_executed,5,self_destruct_cleanup,51099,DeleteFileW,,C:\Users\Public\sample_6335.sh,,
S0005_0008,BOT00058,lateral_smb_spread,6,c2_communication,29417,WSAConnect,,,cdn_provider,
S0005_0008,BOT00058,data_staged_for_exfil,14,payload_execution,27229,WriteProcessMemory,,C:\Users\Public\sample_8451.dll,,
S0005_0008,BOT00058,c2_beacon_sent,21,c2_communication,20560,recv,,,known_c2_infra,recently_registered
S0005_0008,BOT00058,data_staged_for_exfil,22,data_exfiltration,21216,send,,C:\Users\Public\sample_1179.exe,,
S0005_0008,BOT00058,persistence_scheduled_task,28,dormancy_dwell,2526,WaitForSingleObject,,,,
S0005_0008,BOT00058,payload_keylogger_active,31,c2_communication,9729,InternetReadFile,,,,
S0005_0008,BOT00058,lateral_smb_spread,32,lateral_movement,30520,WNetAddConnection2W,,,private_rfc1918,
S0005_0008,BOT00058,self_delete_executed,35,sandbox_evasion_stall,51930,IsDebuggerPresent,,C:\Users\Public\sample_9963.sh,,
S0005_0008,BOT00058,persistence_registry_written,38,persistence_establishment,39322,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0005_0008,BOT00058,uac_bypass_attempted,42,initial_drop,7319,WriteFile,,,,
S0005_0008,BOT00058,anti_debug_triggered,44,privilege_escalation,12454,ImpersonateLoggedOnUser,,,,
S0005_0008,BOT00058,uac_bypass_attempted,46,c2_communication,4300,InternetReadFile,,,,
S0005_0008,BOT00058,process_hollowing_executed,49,self_destruct_cleanup,62648,RegDeleteKeyW,,,,
S0005_0008,BOT00058,payload_ransomware_encrypt,55,payload_execution,5843,VirtualAllocEx,,,,
S0005_0008,BOT00058,persistence_scheduled_task,56,persistence_establishment,64536,CreateServiceW,,,,
S0005_0009,CRY00059,dropper_executed,0,initial_drop,32789,WriteFile,,C:\ProgramData\sample_2758.sh,,
S0005_0009,CRY00059,payload_ransomware_encrypt,3,payload_execution,54499,LoadLibraryA,,,,
S0005_0009,CRY00059,anti_debug_triggered,8,lateral_movement,32034,WMIExecMethod,,,,
S0005_0009,CRY00059,lateral_smb_spread,28,sandbox_evasion_stall,38478,Sleep,,,tor_exit_node,
S0005_0009,CRY00059,sandbox_timing_check,29,sandbox_evasion_stall,29179,Sleep,,,,
S0005_0009,CRY00059,privilege_token_stolen,44,privilege_escalation,41458,OpenProcessToken,,,,
S0005_0009,CRY00059,av_signature_evaded,48,dormancy_dwell,35959,NtDelayExecution,,,,
S0005_0009,CRY00059,lateral_wmi_exec,57,initial_drop,43970,CreateFileW,,,,
S0006_0000,DRO00060,lateral_wmi_exec,3,c2_communication,63443,connect,,,,
S0006_0000,DRO00060,sandbox_timing_check,4,sandbox_evasion_stall,23267,IsDebuggerPresent,,,,
S0006_0000,DRO00060,exfil_https_c2,6,c2_communication,53705,WSAConnect,,,tor_exit_node,
S0006_0000,DRO00060,lateral_smb_spread,12,lateral_movement,20626,WNetAddConnection2W,,,cdn_provider,
S0006_0000,DRO00060,dropper_executed,13,initial_drop,46440,WriteFile,,C:\ProgramData\sample_7171.dll,,
S0006_0000,DRO00060,heuristic_alert_triggered,14,sandbox_evasion_stall,11154,IsDebuggerPresent,,,,
S0006_0000,DRO00060,privilege_token_stolen,22,privilege_escalation,13270,BypassUAC,,,,
S0006_0000,DRO00060,definitive_detection,24,data_exfiltration,5982,send,,,,
S0006_0000,DRO00060,c2_beacon_sent,26,c2_communication,34365,InternetReadFile,,,known_c2_infra,subdomain_c2
S0006_0000,DRO00060,exfil_dns_tunnel,27,persistence_establishment,24951,StartupFolder,,,,subdomain_c2
S0006_0000,DRO00060,data_staged_for_exfil,29,data_exfiltration,42315,send,,C:\ProgramData\sample_1042.dll,,
S0006_0000,DRO00060,self_delete_executed,31,self_destruct_cleanup,2300,SHFileOperationW,,C:\Windows\Temp\sample_6498.bin,,
S0006_0000,DRO00060,dropper_executed,35,initial_drop,4328,WinExec,,C:\Windows\Temp\sample_6888.bin,,
S0006_0000,DRO00060,self_delete_executed,46,self_destruct_cleanup,64550,RegDeleteKeyW,,/tmp/sample_1461.ps1,,
S0006_0000,DRO00060,sandbox_timing_check,52,sandbox_evasion_stall,57001,GetTickCount,,,,
S0006_0000,DRO00060,dropper_executed,57,initial_drop,36168,WriteFile,,/var/run/sample_8629.bin,,
S0006_0000,DRO00060,lateral_smb_spread,58,lateral_movement,30766,WMIExecMethod,,,private_rfc1918,
S0006_0001,BOT00061,sandbox_timing_check,0,sandbox_evasion_stall,23030,CheckRemoteDebuggerPresent,,,,
S0006_0001,BOT00061,lateral_wmi_exec,2,privilege_escalation,33444,BypassUAC,,,,
S0006_0001,BOT00061,av_signature_evaded,14,dormancy_dwell,45731,NtDelayExecution,,,,
S0006_0001,BOT00061,definitive_detection,15,self_destruct_cleanup,35517,SHFileOperationW,,,,
S0006_0001,BOT00061,sandbox_timing_check,21,sandbox_evasion_stall,53524,Sleep,,,,
S0006_0001,BOT00061,sandbox_timing_check,35,sandbox_evasion_stall,13856,IsDebuggerPresent,,,,
S0006_0001,BOT00061,dropper_executed,37,initial_drop,10537,ShellExecuteW,,/home/user/.config/sample_2996.ps1,,
S0006_0001,BOT00061,sandbox_timing_check,50,sandbox_evasion_stall,25270,CheckRemoteDebuggerPresent,,,,
S0006_0001,BOT00061,c2_beacon_sent,56,c2_communication,25645,connect,,,private_rfc1918,subdomain_c2
S0006_0001,BOT00061,definitive_detection,59,dormancy_dwell,61256,SetTimer,,,,
S0006_0002,WOR00062,av_signature_evaded,15,dormancy_dwell,15973,NtDelayExecution,,,,
S0006_0002,WOR00062,exfil_https_c2,17,data_exfiltration,27165,send,,,cdn_provider,
S0006_0002,WOR00062,process_hollowing_executed,19,c2_communication,19491,WSAConnect,,,,
S0006_0002,WOR00062,payload_ransomware_encrypt,27,payload_execution,25795,CreateThread,,,,
S0006_0002,WOR00062,payload_ransomware_encrypt,31,payload_execution,29445,CreateThread,,,,
S0006_0002,WOR00062,self_delete_executed,40,self_destruct_cleanup,52240,RegDeleteKeyW,,C:\ProgramData\sample_9867.sh,,
S0006_0002,WOR00062,persistence_registry_written,45,persistence_establishment,62089,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0006_0002,WOR00062,lotl_binary_abused,46,privilege_escalation,26751,ImpersonateLoggedOnUser,,,,
S0006_0003,DRO00063,process_hollowing_executed,3,dormancy_dwell,52030,NtDelayExecution,,,,
S0006_0003,DRO00063,c2_beacon_sent,6,c2_communication,19070,recv,,,tor_exit_node,legitimate_tld
S0006_0003,DRO00063,dll_sideloading_executed,14,sandbox_evasion_stall,57922,IsDebuggerPresent,,C:\Windows\Temp\sample_1113.sh,,
S0006_0003,DRO00063,av_signature_evaded,25,dormancy_dwell,41660,GetSystemTime,,,,
S0006_0003,DRO00063,payload_ransomware_encrypt,30,payload_execution,41827,WriteProcessMemory,,,,
S0006_0003,DRO00063,dropper_executed,39,initial_drop,35816,ShellExecuteW,,/var/run/sample_9858.sh,,
S0006_0003,DRO00063,definitive_detection,44,c2_communication,11008,connect,,,,
S0006_0003,DRO00063,heuristic_alert_triggered,46,dormancy_dwell,63225,SetTimer,,,,
S0006_0003,DRO00063,persistence_registry_written,52,persistence_establishment,27473,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0006_0003,DRO00063,self_delete_executed,56,self_destruct_cleanup,48055,DeleteFileW,,/var/run/sample_5115.bin,,
S0006_0004,SPY00064,lateral_wmi_exec,5,payload_execution,15108,WriteProcessMemory,,,,
S0006_0004,SPY00064,sandbox_timing_check,15,sandbox_evasion_stall,31054,CheckRemoteDebuggerPresent,,,,
S0006_0004,SPY00064,self_delete_executed,17,self_destruct_cleanup,18714,RegDeleteKeyW,,C:\Users\Public\sample_3695.dll,,
S0006_0004,SPY00064,c2_beacon_sent,18,c2_communication,6862,InternetReadFile,,,legitimate_cloud,recently_registered
S0006_0004,SPY00064,payload_keylogger_active,23,persistence_establishment,50787,SchtasksCreate,,,,
S0006_0004,SPY00064,heuristic_alert_triggered,28,persistence_establishment,62568,StartupFolder,,,,
S0006_0004,SPY00064,c2_beacon_sent,41,c2_communication,53645,recv,,,cdn_provider,recently_registered
S0006_0004,SPY00064,dropper_executed,44,initial_drop,43316,WriteFile,,C:\Users\Public\sample_1213.bat,,
S0006_0004,SPY00064,av_signature_evaded,47,lateral_movement,53049,CreateRemoteThread,,,,
S0006_0004,SPY00064,sandbox_timing_check,54,sandbox_evasion_stall,57254,CheckRemoteDebuggerPresent,,,,
S0006_0004,SPY00064,lotl_binary_abused,58,initial_drop,10963,WinExec,,,,
S0006_0005,WOR00065,av_signature_evaded,6,dormancy_dwell,46695,GetSystemTime,,,,
S0006_0005,WOR00065,av_signature_evaded,11,dormancy_dwell,18587,NtDelayExecution,,,,
S0006_0005,WOR00065,anti_debug_triggered,18,c2_communication,26677,recv,,,,
S0006_0005,WOR00065,sandbox_timing_check,24,sandbox_evasion_stall,49848,GetTickCount,,,,
S0006_0005,WOR00065,data_staged_for_exfil,26,persistence_establishment,37551,RegSetValueExW,,C:\ProgramData\sample_9684.dll,,
S0006_0005,WOR00065,data_staged_for_exfil,34,data_exfiltration,3741,send,,C:\ProgramData\sample_8081.dll,,
S0006_0005,WOR00065,persistence_registry_written,37,persistence_establishment,61694,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0006_0005,WOR00065,sandbox_timing_check,43,sandbox_evasion_stall,4080,GetTickCount,,,,
S0006_0005,WOR00065,self_delete_executed,52,self_destruct_cleanup,34273,DeleteFileW,,C:\Windows\Temp\sample_1107.bin,,
S0006_0006,DRO00066,av_signature_evaded,9,dormancy_dwell,21997,NtDelayExecution,,,,
S0006_0006,DRO00066,payload_keylogger_active,11,lateral_movement,31334,WMIExecMethod,,,,
S0006_0006,DRO00066,payload_cryptominer_spawned,30,payload_execution,40228,VirtualAllocEx,,,,
S0006_0006,DRO00066,c2_beacon_sent,48,c2_communication,59291,connect,,,legitimate_cloud,recently_registered
S0006_0006,DRO00066,dropper_executed,59,initial_drop,23993,WriteFile,,C:\Windows\Temp\sample_5341.ps1,,
S0006_0007,WOR00067,privilege_token_stolen,3,privilege_escalation,51928,AdjustTokenPrivileges,,,,
S0006_0007,WOR00067,sandbox_timing_check,4,sandbox_evasion_stall,30545,GetTickCount,,,,
S0006_0007,WOR00067,exfil_dns_tunnel,8,c2_communication,11138,connect,,,,legitimate_tld
S0006_0007,WOR00067,sandbox_timing_check,14,sandbox_evasion_stall,9032,IsDebuggerPresent,,,,
S0006_0007,WOR00067,sandbox_timing_check,19,sandbox_evasion_stall,35569,Sleep,,,,
S0006_0007,WOR00067,self_delete_executed,23,sandbox_evasion_stall,1901,IsDebuggerPresent,,/home/user/.config/sample_7248.bin,,
S0006_0007,WOR00067,exfil_https_c2,24,data_exfiltration,9074,send,,,private_rfc1918,
S0006_0007,WOR00067,privilege_token_stolen,28,privilege_escalation,23535,AdjustTokenPrivileges,,,,
S0006_0007,WOR00067,data_staged_for_exfil,42,data_exfiltration,25259,send,,/tmp/sample_4464.sh,,
S0006_0007,WOR00067,privilege_token_stolen,45,privilege_escalation,16979,BypassUAC,,,,
S0006_0007,WOR00067,data_staged_for_exfil,46,data_exfiltration,61484,send,,/home/user/.config/sample_1455.sh,,
S0006_0007,WOR00067,privilege_token_stolen,54,privilege_escalation,39189,ImpersonateLoggedOnUser,,,,
S0006_0008,RAN00068,exfil_https_c2,8,privilege_escalation,51557,OpenProcessToken,,,unknown_public,
S0006_0008,RAN00068,c2_beacon_sent,12,c2_communication,10748,recv,,,known_c2_infra,known_malicious
S0006_0008,RAN00068,sandbox_timing_check,17,data_exfiltration,24518,DnsQuery_W,,,,
S0006_0008,RAN00068,dropper_executed,24,initial_drop,50881,WriteFile,,C:\Users\Public\sample_6722.bat,,
S0006_0008,RAN00068,dropper_executed,31,initial_drop,38282,ShellExecuteW,,C:\Windows\Temp\sample_4509.exe,,
S0006_0008,RAN00068,lateral_smb_spread,39,lateral_movement,25528,WNetAddConnection2W,,,legitimate_cloud,
S0006_0008,RAN00068,privilege_token_stolen,48,privilege_escalation,39881,ImpersonateLoggedOnUser,,,,
S0006_0008,RAN00068,lateral_smb_spread,55,lateral_movement,51139,NetShareEnum,,,private_rfc1918,
S0006_0008,RAN00068,payload_ransomware_encrypt,57,payload_execution,17157,CreateThread,,,,
S0006_0009,SPY00069,data_staged_for_exfil,1,data_exfiltration,49575,DnsQuery_W,,C:\Users\Public\sample_1184.bin,,
S0006_0009,SPY00069,self_delete_executed,9,self_destruct_cleanup,46377,RemoveDirectoryW,,C:\Windows\Temp\sample_9650.ps1,,
S0006_0009,SPY00069,lateral_smb_spread,15,lateral_movement,58703,WMIExecMethod,,,private_rfc1918,
S0006_0009,SPY00069,av_signature_evaded,20,lateral_movement,52526,CreateRemoteThread,,,,
S0006_0009,SPY00069,c2_command_received,30,self_destruct_cleanup,49521,RegDeleteKeyW,,,unknown_public,
S0006_0009,SPY00069,c2_beacon_sent,35,c2_communication,39721,recv,,,legitimate_cloud,legitimate_tld
S0006_0009,SPY00069,persistence_registry_written,37,persistence_establishment,38664,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0006_0009,SPY00069,self_delete_executed,38,self_destruct_cleanup,53872,DeleteFileW,,/home/user/.config/sample_2348.bat,,
S0006_0009,SPY00069,av_signature_evaded,39,self_destruct_cleanup,43268,RegDeleteKeyW,,,,
S0006_0009,SPY00069,dropper_executed,54,initial_drop,42893,ShellExecuteW,,C:\ProgramData\sample_1290.sh,,
S0006_0009,SPY00069,data_staged_for_exfil,57,data_exfiltration,15140,DnsQuery_W,,/tmp/sample_3968.dll,,
S0006_0009,SPY00069,payload_ransomware_encrypt,58,payload_execution,39045,WriteProcessMemory,,,,
S0007_0000,BOT00070,lateral_wmi_exec,20,sandbox_evasion_stall,54469,IsDebuggerPresent,,,,
S0007_0000,BOT00070,self_delete_executed,22,self_destruct_cleanup,8881,DeleteFileW,,/home/user/.config/sample_3768.bat,,
S0007_0000,BOT00070,dll_sideloading_executed,27,data_exfiltration,21307,DnsQuery_W,,/tmp/sample_1753.bin,,
S0007_0000,BOT00070,sandbox_timing_check,30,sandbox_evasion_stall,56440,GetTickCount,,,,
S0007_0000,BOT00070,dropper_executed,32,initial_drop,11698,WriteFile,,C:\ProgramData\sample_4136.dll,,
S0007_0000,BOT00070,sandbox_vm_artefact_check,35,sandbox_evasion_stall,38218,IsDebuggerPresent,,,,
S0007_0000,BOT00070,av_signature_evaded,41,dormancy_dwell,16464,WaitForSingleObject,,,,
S0007_0000,BOT00070,sandbox_timing_check,49,sandbox_evasion_stall,61043,CheckRemoteDebuggerPresent,,,,
S0007_0000,BOT00070,lateral_smb_spread,56,lateral_movement,16965,WMIExecMethod,,,private_rfc1918,
S0007_0001,TRO00071,self_delete_executed,5,self_destruct_cleanup,9075,SHFileOperationW,,/home/user/.config/sample_1925.bat,,
S0007_0001,TRO00071,payload_ransomware_encrypt,13,payload_execution,32765,VirtualAllocEx,,,,
S0007_0001,TRO00071,c2_beacon_sent,14,c2_communication,53825,recv,,,unknown_public,legitimate_tld
S0007_0001,TRO00071,definitive_detection,24,self_destruct_cleanup,62421,RegDeleteKeyW,,,,
S0007_0001,TRO00071,dropper_executed,25,initial_drop,51343,WinExec,,C:\Users\Public\sample_1259.bin,,
S0007_0001,TRO00071,sandbox_timing_check,35,sandbox_evasion_stall,18106,Sleep,,,,
S0007_0001,TRO00071,exfil_dns_tunnel,38,lateral_movement,12035,CreateRemoteThread,,,,dga_generated
S0007_0001,TRO00071,lotl_binary_abused,39,c2_communication,60804,connect,,,,
S0007_0001,TRO00071,lateral_smb_spread,43,lateral_movement,56631,CreateRemoteThread,,,legitimate_cloud,
S0007_0001,TRO00071,payload_ransomware_encrypt,49,payload_execution,31997,CreateThread,,,,
S0007_0001,TRO00071,c2_command_received,50,sandbox_evasion_stall,4444,GetTickCount,,,known_c2_infra,
S0007_0001,TRO00071,dropper_executed,51,initial_drop,7518,WinExec,,/home/user/.config/sample_6562.ps1,,
S0007_0001,TRO00071,lateral_smb_spread,54,persistence_establishment,52935,StartupFolder,,,private_rfc1918,
S0007_0002,SPY00072,persistence_registry_written,0,persistence_establishment,40813,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0007_0002,SPY00072,lotl_binary_abused,10,initial_drop,21491,ShellExecuteW,,,,
S0007_0002,SPY00072,payload_ransomware_encrypt,13,payload_execution,63629,LoadLibraryA,,,,
S0007_0002,SPY00072,heuristic_alert_triggered,30,data_exfiltration,7213,send,,,,
S0007_0002,SPY00072,payload_ransomware_encrypt,32,payload_execution,50822,WriteProcessMemory,,,,
S0007_0002,SPY00072,sandbox_vm_artefact_check,35,data_exfiltration,48357,send,,,,
S0007_0002,SPY00072,av_signature_evaded,49,dormancy_dwell,49450,WaitForSingleObject,,,,
S0007_0002,SPY00072,dropper_executed,53,initial_drop,5993,WinExec,,/tmp/sample_3826.bat,,
S0007_0002,SPY00072,lateral_smb_spread,54,lateral_movement,21767,WNetAddConnection2W,,,legitimate_cloud,
S0007_0002,SPY00072,dropper_executed,55,initial_drop,54467,WriteFile,,/var/run/sample_3501.ps1,,
S0007_0003,TRO00073,dropper_executed,0,initial_drop,46482,CreateFileW,,/tmp/sample_1030.bat,,
S0007_0003,TRO00073,payload_cryptominer_spawned,15,lateral_movement,39178,WMIExecMethod,,,,
S0007_0003,TRO00073,lateral_smb_spread,19,lateral_movement,18298,CreateRemoteThread,,,known_c2_infra,
S0007_0003,TRO00073,self_delete_executed,21,self_destruct_cleanup,37561,DeleteFileW,,C:\ProgramData\sample_9512.bat,,
S0007_0003,TRO00073,payload_ransomware_encrypt,26,payload_execution,22812,LoadLibraryA,,,,
S0007_0003,TRO00073,lateral_smb_spread,36,initial_drop,54297,WinExec,,,legitimate_cloud,
S0007_0003,TRO00073,sandbox_vm_artefact_check,42,sandbox_evasion_stall,48108,GetTickCount,,,,
S0007_0003,TRO00073,persistence_registry_written,45,persistence_establishment,13308,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0007_0004,CRY00074,data_staged_for_exfil,1,data_exfiltration,56557,HttpSendRequestW,,C:\Windows\Temp\sample_1735.dll,,
S0007_0004,CRY00074,av_signature_evaded,11,data_exfiltration,12899,InternetOpenW,,,,
S0007_0004,CRY00074,privilege_token_stolen,16,initial_drop,48797,WinExec,,,,
S0007_0004,CRY00074,persistence_registry_written,31,persistence_establishment,44769,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0007_0004,CRY00074,dropper_executed,32,initial_drop,11921,ShellExecuteW,,C:\Users\Public\sample_6384.bat,,
S0007_0004,CRY00074,lateral_smb_spread,39,lateral_movement,6716,CreateRemoteThread,,,cdn_provider,
S0007_0004,CRY00074,self_delete_executed,41,self_destruct_cleanup,64439,RegDeleteKeyW,,C:\ProgramData\sample_5446.exe,,
S0007_0004,CRY00074,heuristic_alert_triggered,47,initial_drop,65246,WriteFile,,,,
S0007_0004,CRY00074,sandbox_timing_check,54,sandbox_evasion_stall,38963,IsDebuggerPresent,,,,
S0007_0004,CRY00074,av_signature_evaded,56,dormancy_dwell,1106,SetTimer,,,,
S0007_0005,SPY00075,persistence_registry_written,4,persistence_establishment,10027,RegSetValueExW,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0007_0005,SPY00075,lateral_smb_spread,5,lateral_movement,41233,CreateRemoteThread,,,private_rfc1918,
S0007_0005,SPY00075,self_delete_executed,9,persistence_establishment,19508,CreateServiceW,,/home/user/.config/sample_4643.sh,,
S0007_0005,SPY00075,sandbox_timing_check,10,sandbox_evasion_stall,58178,Sleep,,,,
S0007_0005,SPY00075,sandbox_timing_check,17,sandbox_evasion_stall,49464,IsDebuggerPresent,,,,
S0007_0005,SPY00075,av_signature_evaded,18,dormancy_dwell,55036,NtDelayExecution,,,,
S0007_0005,SPY00075,av_signature_evaded,22,initial_drop,43430,ShellExecuteW,,,,
S0007_0005,SPY00075,dropper_executed,37,initial_drop,63518,ShellExecuteW,,/var/run/sample_2939.bin,,
S0007_0005,SPY00075,av_signature_evaded,40,dormancy_dwell,61481,WaitForSingleObject,,,,
S0007_0005,SPY00075,persistence_registry_written,41,persistence_establishment,50968,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0007_0005,SPY00075,av_signature_evaded,48,dormancy_dwell,63168,WaitForSingleObject,,,,
S0007_0005,SPY00075,payload_ransomware_encrypt,52,initial_drop,49436,ShellExecuteW,,,,
S0007_0005,SPY00075,c2_beacon_sent,57,c2_communication,3566,WSAConnect,,,cdn_provider,known_malicious
S0007_0006,WOR00076,privilege_token_stolen,0,privilege_escalation,45826,AdjustTokenPrivileges,,,,
S0007_0006,WOR00076,data_staged_for_exfil,7,data_exfiltration,42219,HttpSendRequestW,,/home/user/.config/sample_7081.dll,,
S0007_0006,WOR00076,heuristic_alert_triggered,20,privilege_escalation,33897,OpenProcessToken,,,,
S0007_0006,WOR00076,data_staged_for_exfil,31,data_exfiltration,13357,DnsQuery_W,,/home/user/.config/sample_5717.bat,,
S0007_0006,WOR00076,lateral_smb_spread,32,persistence_establishment,8317,StartupFolder,,,private_rfc1918,
S0007_0006,WOR00076,c2_beacon_sent,45,c2_communication,40894,WSAConnect,,,unknown_public,legitimate_tld
S0007_0006,WOR00076,privilege_token_stolen,55,privilege_escalation,6484,BypassUAC,,,,
S0007_0006,WOR00076,definitive_detection,58,payload_execution,50574,CreateThread,,,,
S0007_0007,ROO00077,sandbox_timing_check,5,sandbox_evasion_stall,65087,Sleep,,,,
S0007_0007,ROO00077,uac_bypass_attempted,10,persistence_establishment,28374,CreateServiceW,,,,
S0007_0007,ROO00077,sandbox_timing_check,23,sandbox_evasion_stall,46234,IsDebuggerPresent,,,,
S0007_0007,ROO00077,sandbox_timing_check,29,self_destruct_cleanup,9653,DeleteFileW,,,,
S0007_0007,ROO00077,lateral_smb_spread,31,lateral_movement,3117,WMIExecMethod,,,private_rfc1918,
S0007_0007,ROO00077,privilege_token_stolen,37,privilege_escalation,21911,BypassUAC,,,,
S0007_0007,ROO00077,privilege_token_stolen,39,privilege_escalation,49350,OpenProcessToken,,,,
S0007_0007,ROO00077,self_delete_executed,41,self_destruct_cleanup,16899,SHFileOperationW,,/home/user/.config/sample_9830.bin,,
S0007_0007,ROO00077,sandbox_timing_check,42,sandbox_evasion_stall,15425,Sleep,,,,
S0007_0007,ROO00077,payload_ransomware_encrypt,44,payload_execution,20593,CreateThread,,,,
S0007_0007,ROO00077,data_staged_for_exfil,47,data_exfiltration,64141,HttpSendRequestW,,C:\Users\Public\sample_6474.dll,,
S0007_0007,ROO00077,av_signature_evaded,51,dormancy_dwell,55832,NtDelayExecution,,,,
S0007_0007,ROO00077,dropper_executed,54,privilege_escalation,24238,AdjustTokenPrivileges,,/tmp/sample_1985.bin,,
S0007_0007,ROO00077,heuristic_alert_triggered,55,payload_execution,29140,CreateThread,,,,
S0007_0007,ROO00077,lateral_smb_spread,56,lateral_movement,56005,NetShareEnum,,,legitimate_cloud,
S0007_0007,ROO00077,sandbox_timing_check,59,initial_drop,38319,WriteFile,,,,
S0007_0008,FIL00078,payload_ransomware_encrypt,3,payload_execution,10495,LoadLibraryA,,,,
S0007_0008,FIL00078,data_staged_for_exfil,5,data_exfiltration,29679,DnsQuery_W,,C:\Users\Public\sample_1461.ps1,,
S0007_0008,FIL00078,lotl_binary_abused,11,sandbox_evasion_stall,39141,GetTickCount,,,,
S0007_0008,FIL00078,lateral_smb_spread,12,privilege_escalation,46150,AdjustTokenPrivileges,,,legitimate_cloud,
S0007_0008,FIL00078,c2_beacon_sent,14,c2_communication,1378,connect,,,cdn_provider,legitimate_tld
S0007_0008,FIL00078,payload_keylogger_active,17,privilege_escalation,19434,OpenProcessToken,,,,
S0007_0008,FIL00078,c2_beacon_sent,22,c2_communication,4542,InternetReadFile,,,unknown_public,subdomain_c2
S0007_0008,FIL00078,dropper_executed,31,initial_drop,55437,CreateFileW,,/var/run/sample_3658.exe,,
S0007_0008,FIL00078,payload_ransomware_encrypt,41,payload_execution,15057,LoadLibraryA,,,,
S0007_0008,FIL00078,c2_beacon_sent,47,c2_communication,26583,WSAConnect,,,legitimate_cloud,legitimate_tld
S0007_0008,FIL00078,dll_sideloading_executed,51,data_exfiltration,51950,HttpSendRequestW,,C:\Windows\Temp\sample_3323.sh,,
S0007_0009,CRY00079,c2_beacon_sent,10,c2_communication,34200,recv,,,legitimate_cloud,dga_generated
S0007_0009,CRY00079,c2_beacon_sent,18,c2_communication,27752,WSAConnect,,,cdn_provider,legitimate_tld
S0007_0009,CRY00079,lateral_smb_spread,21,lateral_movement,27315,WNetAddConnection2W,,,legitimate_cloud,
S0007_0009,CRY00079,data_staged_for_exfil,24,initial_drop,7722,WriteFile,,/var/run/sample_8735.dll,,
S0007_0009,CRY00079,privilege_token_stolen,25,privilege_escalation,26081,BypassUAC,,,,
S0007_0009,CRY00079,av_signature_evaded,26,self_destruct_cleanup,13515,SHFileOperationW,,,,
S0007_0009,CRY00079,self_delete_executed,28,self_destruct_cleanup,27242,RegDeleteKeyW,,/home/user/.config/sample_4111.bat,,
S0007_0009,CRY00079,av_signature_evaded,58,c2_communication,17451,connect,,,,
S0008_0000,DRO00080,lotl_binary_abused,11,dormancy_dwell,53766,WaitForSingleObject,,,,
S0008_0000,DRO00080,sandbox_timing_check,24,sandbox_evasion_stall,36115,GetTickCount,,,,
S0008_0000,DRO00080,lateral_smb_spread,27,lateral_movement,60675,WNetAddConnection2W,,,cdn_provider,
S0008_0000,DRO00080,sandbox_timing_check,30,sandbox_evasion_stall,21553,GetTickCount,,,,
S0008_0000,DRO00080,data_staged_for_exfil,43,data_exfiltration,59499,DnsQuery_W,,C:\ProgramData\sample_5776.sh,,
S0008_0000,DRO00080,payload_ransomware_encrypt,53,payload_execution,23217,WriteProcessMemory,,,,
S0008_0001,SPY00081,payload_keylogger_active,23,persistence_establishment,47584,CreateServiceW,,,,
S0008_0001,SPY00081,exfil_https_c2,31,initial_drop,53031,ShellExecuteW,,,private_rfc1918,
S0008_0001,SPY00081,dll_sideloading_executed,32,persistence_establishment,7885,StartupFolder,,C:\Users\Public\sample_7244.sh,,
S0008_0001,SPY00081,persistence_registry_written,47,persistence_establishment,58449,StartupFolder,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0008_0001,SPY00081,payload_ransomware_encrypt,55,payload_execution,5026,LoadLibraryA,,,,
S0008_0002,TRO00082,lateral_smb_spread,0,lateral_movement,29382,NetShareEnum,,,known_c2_infra,
S0008_0002,TRO00082,c2_beacon_sent,7,c2_communication,23706,WSAConnect,,,cdn_provider,legitimate_tld
S0008_0002,TRO00082,c2_beacon_sent,20,c2_communication,48683,connect,,,cdn_provider,recently_registered
S0008_0002,TRO00082,self_delete_executed,24,self_destruct_cleanup,34880,RemoveDirectoryW,,/var/run/sample_6873.exe,,
S0008_0002,TRO00082,privilege_token_stolen,26,privilege_escalation,32777,BypassUAC,,,,
S0008_0002,TRO00082,payload_ransomware_encrypt,27,payload_execution,56636,CreateThread,,,,
S0008_0002,TRO00082,privilege_token_stolen,28,privilege_escalation,62717,ImpersonateLoggedOnUser,,,,
S0008_0002,TRO00082,lateral_smb_spread,32,lateral_movement,59044,WNetAddConnection2W,,,private_rfc1918,
S0008_0002,TRO00082,payload_ransomware_encrypt,37,payload_execution,46576,WriteProcessMemory,,,,
S0008_0002,TRO00082,sandbox_timing_check,38,sandbox_evasion_stall,48957,Sleep,,,,
S0008_0002,TRO00082,lotl_binary_abused,48,dormancy_dwell,48318,SetTimer,,,,
S0008_0002,TRO00082,payload_ransomware_encrypt,49,payload_execution,60547,CreateThread,,,,
S0008_0002,TRO00082,sandbox_timing_check,50,sandbox_evasion_stall,43558,GetTickCount,,,,
S0008_0002,TRO00082,lateral_smb_spread,52,lateral_movement,24875,CreateRemoteThread,,,known_c2_infra,
S0008_0002,TRO00082,lotl_binary_abused,56,sandbox_evasion_stall,29394,GetTickCount,,,,
S0008_0002,TRO00082,self_delete_executed,57,self_destruct_cleanup,15889,DeleteFileW,,/tmp/sample_1794.ps1,,
S0008_0003,APT00083,lateral_smb_spread,3,lateral_movement,12485,WMIExecMethod,,,legitimate_cloud,
S0008_0003,APT00083,process_hollowing_executed,6,c2_communication,54968,recv,,,,
S0008_0003,APT00083,process_hollowing_executed,14,privilege_escalation,57796,OpenProcessToken,,,,
S0008_0003,APT00083,lateral_smb_spread,17,lateral_movement,10396,WMIExecMethod,,,legitimate_cloud,
S0008_0003,APT00083,persistence_registry_written,26,persistence_establishment,45305,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0008_0003,APT00083,persistence_registry_written,27,persistence_establishment,1766,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0008_0003,APT00083,data_staged_for_exfil,32,data_exfiltration,3685,send,,C:\Windows\Temp\sample_6950.ps1,,
S0008_0003,APT00083,privilege_token_stolen,42,payload_execution,33426,VirtualAllocEx,,,,
S0008_0003,APT00083,payload_ransomware_encrypt,46,payload_execution,64797,WriteProcessMemory,,,,
S0008_0003,APT00083,persistence_registry_written,48,persistence_establishment,45608,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0008_0003,APT00083,sandbox_timing_check,49,sandbox_evasion_stall,16279,IsDebuggerPresent,,,,
S0008_0003,APT00083,persistence_scheduled_task,50,sandbox_evasion_stall,64179,CheckRemoteDebuggerPresent,,,,
S0008_0003,APT00083,self_delete_executed,57,c2_communication,9501,InternetReadFile,,/tmp/sample_3586.bin,,
S0008_0004,CRY00084,av_signature_evaded,0,privilege_escalation,11365,OpenProcessToken,,,,
S0008_0004,CRY00084,payload_ransomware_encrypt,6,payload_execution,60789,WriteProcessMemory,,,,
S0008_0004,CRY00084,av_signature_evaded,15,dormancy_dwell,3473,NtDelayExecution,,,,
S0008_0004,CRY00084,c2_beacon_sent,17,c2_communication,40659,WSAConnect,,,cdn_provider,legitimate_tld
S0008_0004,CRY00084,privilege_token_stolen,35,privilege_escalation,36272,OpenProcessToken,,,,
S0008_0004,CRY00084,self_delete_executed,36,self_destruct_cleanup,36052,DeleteFileW,,C:\Windows\Temp\sample_8716.sh,,
S0008_0004,CRY00084,dropper_executed,45,c2_communication,61918,WSAConnect,,/home/user/.config/sample_3779.sh,,
S0008_0004,CRY00084,data_staged_for_exfil,49,data_exfiltration,17461,InternetOpenW,,/tmp/sample_1267.dll,,
S0008_0004,CRY00084,payload_ransomware_encrypt,54,data_exfiltration,43792,InternetOpenW,,,,
S0008_0004,CRY00084,lotl_binary_abused,56,dormancy_dwell,29512,NtDelayExecution,,,,
S0008_0005,BOT00085,self_delete_executed,0,self_destruct_cleanup,51578,DeleteFileW,,/var/run/sample_1326.exe,,
S0008_0005,BOT00085,persistence_registry_written,14,persistence_establishment,5939,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0008_0005,BOT00085,av_signature_evaded,16,dormancy_dwell,58639,SetTimer,,,,
S0008_0005,BOT00085,dropper_executed,25,initial_drop,45423,ShellExecuteW,,/tmp/sample_4168.dll,,
S0008_0005,BOT00085,av_signature_evaded,28,dormancy_dwell,34044,NtDelayExecution,,,,
S0008_0005,BOT00085,privilege_token_stolen,42,privilege_escalation,48438,BypassUAC,,,,
S0008_0005,BOT00085,privilege_token_stolen,43,privilege_escalation,12616,AdjustTokenPrivileges,,,,
S0008_0005,BOT00085,heuristic_alert_triggered,55,payload_execution,32304,CreateThread,,,,
S0008_0006,RAN00086,payload_cryptominer_spawned,10,lateral_movement,16682,NetShareEnum,,,,
S0008_0006,RAN00086,av_signature_evaded,28,dormancy_dwell,58512,SetTimer,,,,
S0008_0006,RAN00086,privilege_token_stolen,43,privilege_escalation,53172,OpenProcessToken,,,,
S0008_0006,RAN00086,dropper_executed,49,sandbox_evasion_stall,57801,IsDebuggerPresent,,/home/user/.config/sample_7398.ps1,,
S0008_0007,WOR00087,lotl_binary_abused,0,payload_execution,19806,CreateThread,,,,
S0008_0007,WOR00087,data_staged_for_exfil,4,data_exfiltration,39039,DnsQuery_W,,/tmp/sample_4508.ps1,,
S0008_0007,WOR00087,payload_keylogger_active,11,persistence_establishment,62968,CreateServiceW,,,,
S0008_0007,WOR00087,c2_command_received,12,lateral_movement,35464,NetShareEnum,,,unknown_public,
S0008_0007,WOR00087,privilege_token_stolen,19,privilege_escalation,65384,ImpersonateLoggedOnUser,,,,
S0008_0007,WOR00087,dropper_executed,24,privilege_escalation,21307,ImpersonateLoggedOnUser,,/tmp/sample_6141.exe,,
S0008_0007,WOR00087,payload_ransomware_encrypt,25,payload_execution,39749,VirtualAllocEx,,,,
S0008_0007,WOR00087,data_staged_for_exfil,43,data_exfiltration,3731,HttpSendRequestW,,/tmp/sample_8807.ps1,,
S0008_0007,WOR00087,c2_beacon_sent,44,c2_communication,18559,connect,,,legitimate_cloud,recently_registered
S0008_0007,WOR00087,av_signature_evaded,49,dormancy_dwell,57583,GetSystemTime,,,,
S0008_0008,BOT00088,sandbox_timing_check,2,sandbox_evasion_stall,20090,CheckRemoteDebuggerPresent,,,,
S0008_0008,BOT00088,sandbox_timing_check,3,sandbox_evasion_stall,33887,CheckRemoteDebuggerPresent,,,,
S0008_0008,BOT00088,lateral_smb_spread,7,lateral_movement,62505,NetShareEnum,,,legitimate_cloud,
S0008_0008,BOT00088,dropper_executed,10,dormancy_dwell,19525,SetTimer,,/var/run/sample_8201.sh,,
S0008_0008,BOT00088,process_hollowing_executed,17,persistence_establishment,29581,SchtasksCreate,,,,
S0008_0008,BOT00088,lateral_smb_spread,20,lateral_movement,3714,NetShareEnum,,,unknown_public,
S0008_0008,BOT00088,privilege_token_stolen,33,privilege_escalation,63427,AdjustTokenPrivileges,,,,
S0008_0008,BOT00088,c2_beacon_sent,35,c2_communication,53289,InternetReadFile,,,known_c2_infra,dga_generated
S0008_0008,BOT00088,sandbox_timing_check,38,sandbox_evasion_stall,30814,GetTickCount,,,,
S0008_0008,BOT00088,av_signature_evaded,42,dormancy_dwell,42229,SetTimer,,,,
S0008_0008,BOT00088,sandbox_timing_check,44,sandbox_evasion_stall,21467,GetTickCount,,,,
S0008_0008,BOT00088,persistence_registry_written,49,persistence_establishment,48796,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0008_0008,BOT00088,lateral_smb_spread,53,lateral_movement,4034,WNetAddConnection2W,,,cdn_provider,
S0008_0008,BOT00088,exfil_dns_tunnel,56,privilege_escalation,17153,ImpersonateLoggedOnUser,,,,recently_registered
S0008_0008,BOT00088,sandbox_timing_check,57,sandbox_evasion_stall,24258,GetTickCount,,,,
S0008_0009,APT00089,c2_beacon_sent,4,c2_communication,5438,InternetReadFile,,,private_rfc1918,legitimate_tld
S0008_0009,APT00089,c2_command_received,8,sandbox_evasion_stall,58581,GetTickCount,,,cdn_provider,
S0008_0009,APT00089,definitive_detection,13,dormancy_dwell,4081,SetTimer,,,,
S0008_0009,APT00089,persistence_registry_written,16,persistence_establishment,3815,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0008_0009,APT00089,exfil_dns_tunnel,19,payload_execution,38325,WriteProcessMemory,,,,known_malicious
S0008_0009,APT00089,uac_bypass_attempted,21,lateral_movement,58156,CreateRemoteThread,,,,
S0008_0009,APT00089,data_staged_for_exfil,26,data_exfiltration,28111,DnsQuery_W,,C:\ProgramData\sample_4101.sh,,
S0008_0009,APT00089,privilege_token_stolen,34,privilege_escalation,52789,BypassUAC,,,,
S0008_0009,APT00089,dropper_executed,35,initial_drop,5307,WriteFile,,/home/user/.config/sample_5536.ps1,,
S0008_0009,APT00089,privilege_token_stolen,40,privilege_escalation,48669,OpenProcessToken,,,,
S0008_0009,APT00089,self_delete_executed,42,self_destruct_cleanup,3595,RegDeleteKeyW,,C:\Users\Public\sample_9792.bat,,
S0008_0009,APT00089,av_signature_evaded,50,dormancy_dwell,12681,NtDelayExecution,,,,
S0008_0009,APT00089,payload_ransomware_encrypt,54,payload_execution,63432,VirtualAllocEx,,,,
S0008_0009,APT00089,exfil_dns_tunnel,56,c2_communication,5802,WSAConnect,,,,known_malicious
S0009_0000,SPY00090,payload_ransomware_encrypt,1,payload_execution,26654,WriteProcessMemory,,,,
S0009_0000,SPY00090,lateral_wmi_exec,4,data_exfiltration,54289,send,,,,
S0009_0000,SPY00090,sandbox_timing_check,32,sandbox_evasion_stall,57267,Sleep,,,,
S0009_0000,SPY00090,c2_beacon_sent,39,c2_communication,19121,InternetReadFile,,,cdn_provider,dga_generated
S0009_0000,SPY00090,lateral_smb_spread,45,lateral_movement,28362,NetShareEnum,,,cdn_provider,
S0009_0001,APT00091,payload_ransomware_encrypt,0,payload_execution,29464,WriteProcessMemory,,,,
S0009_0001,APT00091,sandbox_timing_check,2,sandbox_evasion_stall,23258,GetTickCount,,,,
S0009_0001,APT00091,sandbox_timing_check,3,sandbox_evasion_stall,6496,IsDebuggerPresent,,,,
S0009_0001,APT00091,persistence_registry_written,6,sandbox_evasion_stall,35988,IsDebuggerPresent,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0009_0001,APT00091,payload_ransomware_encrypt,9,payload_execution,38512,CreateThread,,,,
S0009_0001,APT00091,payload_ransomware_encrypt,24,payload_execution,54577,CreateThread,,,,
S0009_0001,APT00091,payload_ransomware_encrypt,32,payload_execution,15565,VirtualAllocEx,,,,
S0009_0001,APT00091,anti_debug_triggered,33,initial_drop,31972,WinExec,,,,
S0009_0001,APT00091,payload_ransomware_encrypt,36,payload_execution,50573,CreateThread,,,,
S0009_0001,APT00091,persistence_registry_written,37,persistence_establishment,64499,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0009_0001,APT00091,payload_ransomware_encrypt,43,payload_execution,42188,WriteProcessMemory,,,,
S0009_0001,APT00091,dropper_executed,50,initial_drop,3570,WriteFile,,/var/run/sample_7853.bat,,
S0009_0001,APT00091,payload_ransomware_encrypt,52,payload_execution,61400,LoadLibraryA,,,,
S0009_0001,APT00091,c2_beacon_sent,53,c2_communication,18982,WSAConnect,,,cdn_provider,subdomain_c2
S0009_0001,APT00091,persistence_registry_written,55,persistence_establishment,32109,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,,
S0009_0002,APT00092,self_delete_executed,8,self_destruct_cleanup,21381,RemoveDirectoryW,,C:\Windows\Temp\sample_7871.bin,,
S0009_0002,APT00092,av_signature_evaded,11,dormancy_dwell,4751,NtDelayExecution,,,,
S0009_0002,APT00092,c2_beacon_sent,34,c2_communication,28332,WSAConnect,,,unknown_public,known_malicious
S0009_0002,APT00092,privilege_token_stolen,36,privilege_escalation,15991,ImpersonateLoggedOnUser,,,,
S0009_0002,APT00092,data_staged_for_exfil,39,persistence_establishment,43638,CreateServiceW,,/tmp/sample_1014.bin,,
S0009_0002,APT00092,persistence_registry_written,51,persistence_establishment,31035,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0009_0002,APT00092,dropper_executed,56,initial_drop,46230,ShellExecuteW,,C:\Users\Public\sample_1658.exe,,
S0009_0003,WOR00093,persistence_registry_written,3,persistence_establishment,45894,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0009_0003,WOR00093,payload_cryptominer_spawned,4,privilege_escalation,2070,BypassUAC,,,,
S0009_0003,WOR00093,payload_ransomware_encrypt,11,payload_execution,55138,VirtualAllocEx,,,,
S0009_0003,WOR00093,lateral_smb_spread,14,lateral_movement,44105,CreateRemoteThread,,,cdn_provider,
S0009_0003,WOR00093,payload_ransomware_encrypt,17,payload_execution,30280,LoadLibraryA,,,,
S0009_0003,WOR00093,lateral_smb_spread,20,lateral_movement,27230,NetShareEnum,,,private_rfc1918,
S0009_0003,WOR00093,dropper_executed,27,initial_drop,15668,WinExec,,C:\ProgramData\sample_6048.ps1,,
S0009_0003,WOR00093,lateral_smb_spread,35,lateral_movement,38824,CreateRemoteThread,,,known_c2_infra,
S0009_0003,WOR00093,dropper_executed,39,data_exfiltration,64549,send,,/var/run/sample_2783.bin,,
S0009_0003,WOR00093,payload_ransomware_encrypt,40,payload_execution,49122,WriteProcessMemory,,,,
S0009_0003,WOR00093,sandbox_timing_check,47,sandbox_evasion_stall,15545,CheckRemoteDebuggerPresent,,,,
S0009_0003,WOR00093,dropper_executed,53,initial_drop,32825,ShellExecuteW,,C:\ProgramData\sample_2760.exe,,
S0009_0003,WOR00093,privilege_token_stolen,56,privilege_escalation,11485,AdjustTokenPrivileges,,,,
S0009_0003,WOR00093,payload_ransomware_encrypt,58,payload_execution,19090,LoadLibraryA,,,,
S0009_0004,APT00094,persistence_registry_written,5,persistence_establishment,2725,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,,
S0009_0004,APT00094,sandbox_timing_check,19,lateral_movement,54243,CreateRemoteThread,,,,
S0009_0004,APT00094,sandbox_timing_check,21,sandbox_evasion_stall,5368,GetTickCount,,,,
S0009_0004,APT00094,data_staged_for_exfil,24,c2_communication,5396,connect,,/tmp/sample_5954.bat,,
S0009_0004,APT00094,sandbox_timing_check,34,sandbox_evasion_stall,13185,IsDebuggerPresent,,,,
S0009_0004,APT00094,dropper_executed,36,initial_drop,63213,WriteFile,,/var/run/sample_4817.dll,,
S0009_0004,APT00094,privilege_token_stolen,40,privilege_escalation,50788,ImpersonateLoggedOnUser,,,,
S0009_0004,APT00094,heuristic_alert_triggered,49,sandbox_evasion_stall,31144,GetTickCount,,,,
S0009_0004,APT00094,dropper_executed,50,initial_drop,60540,ShellExecuteW,,C:\ProgramData\sample_1075.sh,,
S0009_0004,APT00094,dropper_executed,52,initial_drop,38541,CreateFileW,,C:\Windows\Temp\sample_3346.bin,,
S0009_0004,APT00094,uac_bypass_attempted,54,payload_execution,35558,LoadLibraryA,,,,
S0009_0004,APT00094,c2_beacon_sent,55,data_exfiltration,13358,send,,,known_c2_infra,legitimate_tld
S0009_0004,APT00094,payload_ransomware_encrypt,59,payload_execution,61749,CreateThread,,,,
S0009_0005,ROO00095,privilege_token_stolen,0,privilege_escalation,1174,AdjustTokenPrivileges,,,,
S0009_0005,ROO00095,self_delete_executed,2,privilege_escalation,25247,AdjustTokenPrivileges,,/home/user/.config/sample_6043.sh,,
S0009_0005,ROO00095,payload_keylogger_active,8,self_destruct_cleanup,18193,SHFileOperationW,,,,
S0009_0005,ROO00095,data_staged_for_exfil,11,data_exfiltration,8938,InternetOpenW,,/home/user/.config/sample_1487.dll,,
S0009_0005,ROO00095,lateral_smb_spread,13,lateral_movement,15305,NetShareEnum,,,cdn_provider,
S0009_0005,ROO00095,c2_beacon_sent,15,c2_communication,2867,InternetReadFile,,,private_rfc1918,subdomain_c2
S0009_0005,ROO00095,sandbox_timing_check,23,privilege_escalation,28828,AdjustTokenPrivileges,,,,
S0009_0005,ROO00095,lateral_smb_spread,25,lateral_movement,5918,NetShareEnum,,,private_rfc1918,
S0009_0005,ROO00095,dropper_executed,37,initial_drop,10262,WinExec,,/home/user/.config/sample_8280.bin,,
S0009_0005,ROO00095,persistence_registry_written,47,persistence_establishment,41630,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0009_0005,ROO00095,payload_ransomware_encrypt,53,payload_execution,54602,WriteProcessMemory,,,,
S0009_0005,ROO00095,payload_ransomware_encrypt,54,payload_execution,1637,LoadLibraryA,,,,
S0009_0005,ROO00095,av_signature_evaded,56,dormancy_dwell,11283,WaitForSingleObject,,,,
S0009_0005,ROO00095,c2_beacon_sent,59,c2_communication,41370,WSAConnect,,,private_rfc1918,subdomain_c2
S0009_0006,ROO00096,payload_ransomware_encrypt,0,payload_execution,2246,WriteProcessMemory,,,,
S0009_0006,ROO00096,self_delete_executed,1,self_destruct_cleanup,38323,RegDeleteKeyW,,/home/user/.config/sample_6761.sh,,
S0009_0006,ROO00096,data_staged_for_exfil,2,data_exfiltration,59120,HttpSendRequestW,,/home/user/.config/sample_4352.exe,,
S0009_0006,ROO00096,sandbox_timing_check,11,sandbox_evasion_stall,47644,GetTickCount,,,,
S0009_0006,ROO00096,c2_beacon_sent,23,c2_communication,62393,recv,,,cdn_provider,dga_generated
S0009_0006,ROO00096,c2_beacon_sent,26,c2_communication,30294,WSAConnect,,,legitimate_cloud,legitimate_tld
S0009_0006,ROO00096,self_delete_executed,29,self_destruct_cleanup,55119,RemoveDirectoryW,,C:\Users\Public\sample_2539.sh,,
S0009_0006,ROO00096,data_staged_for_exfil,30,self_destruct_cleanup,62089,DeleteFileW,,/home/user/.config/sample_8761.ps1,,
S0009_0006,ROO00096,privilege_token_stolen,31,privilege_escalation,18452,AdjustTokenPrivileges,,,,
S0009_0006,ROO00096,heuristic_alert_triggered,33,data_exfiltration,48403,InternetOpenW,,,,
S0009_0006,ROO00096,av_signature_evaded,43,dormancy_dwell,21435,SetTimer,,,,
S0009_0006,ROO00096,dropper_executed,45,initial_drop,10313,WinExec,,/home/user/.config/sample_1837.dll,,
S0009_0006,ROO00096,exfil_dns_tunnel,53,persistence_establishment,26282,CreateServiceW,,,,known_malicious
S0009_0007,CRY00097,sandbox_timing_check,6,sandbox_evasion_stall,27408,CheckRemoteDebuggerPresent,,,,
S0009_0007,CRY00097,dropper_executed,12,initial_drop,44165,WinExec,,/var/run/sample_9049.exe,,
S0009_0007,CRY00097,sandbox_timing_check,13,sandbox_evasion_stall,54166,CheckRemoteDebuggerPresent,,,,
S0009_0007,CRY00097,sandbox_timing_check,22,sandbox_evasion_stall,43280,IsDebuggerPresent,,,,
S0009_0007,CRY00097,sandbox_vm_artefact_check,23,dormancy_dwell,3933,WaitForSingleObject,,,,
S0009_0007,CRY00097,self_delete_executed,40,self_destruct_cleanup,7958,DeleteFileW,,/tmp/sample_5282.bat,,
S0009_0007,CRY00097,lotl_binary_abused,41,payload_execution,2376,CreateThread,,,,
S0009_0007,CRY00097,sandbox_timing_check,46,sandbox_evasion_stall,9221,GetTickCount,,,,
S0009_0007,CRY00097,self_delete_executed,47,self_destruct_cleanup,54616,DeleteFileW,,/var/run/sample_1239.sh,,
S0009_0007,CRY00097,process_hollowing_executed,53,c2_communication,47780,recv,,,,
S0009_0007,CRY00097,exfil_https_c2,59,data_exfiltration,60099,InternetOpenW,,,cdn_provider,
S0009_0008,CRY00098,persistence_registry_written,2,persistence_establishment,63908,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,,
S0009_0008,CRY00098,c2_command_received,15,sandbox_evasion_stall,47767,CheckRemoteDebuggerPresent,,,known_c2_infra,
S0009_0008,CRY00098,persistence_registry_written,18,persistence_establishment,38809,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0009_0008,CRY00098,data_staged_for_exfil,20,data_exfiltration,13653,InternetOpenW,,/tmp/sample_4172.sh,,
S0009_0008,CRY00098,payload_cryptominer_spawned,24,sandbox_evasion_stall,26534,CheckRemoteDebuggerPresent,,,,
S0009_0008,CRY00098,persistence_registry_written,36,persistence_establishment,23973,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,,
S0009_0008,CRY00098,sandbox_timing_check,40,payload_execution,61300,VirtualAllocEx,,,,
S0009_0008,CRY00098,c2_beacon_sent,43,c2_communication,16955,WSAConnect,,,unknown_public,recently_registered
S0009_0008,CRY00098,payload_cryptominer_spawned,48,self_destruct_cleanup,49775,RegDeleteKeyW,,,,
S0009_0008,CRY00098,av_signature_evaded,52,dormancy_dwell,10850,GetSystemTime,,,,
S0009_0008,CRY00098,dll_sideloading_executed,58,self_destruct_cleanup,32020,RegDeleteKeyW,,C:\Windows\Temp\sample_8293.exe,,
S0009_0009,TRO00099,lateral_smb_spread,10,lateral_movement,35827,WMIExecMethod,,,known_c2_infra,
S0009_0009,TRO00099,self_delete_executed,14,self_destruct_cleanup,13028,RegDeleteKeyW,,/var/run/sample_9880.sh,,
S0009_0009,TRO00099,c2_beacon_sent,21,c2_communication,61627,recv,,,tor_exit_node,legitimate_tld
S0009_0009,TRO00099,sandbox_timing_check,30,sandbox_evasion_stall,8804,CheckRemoteDebuggerPresent,,,,
S0009_0009,TRO00099,lateral_wmi_exec,40,data_exfiltration,16072,DnsQuery_W,,,,
S0009_0009,TRO00099,sandbox_timing_check,47,sandbox_evasion_stall,56837,IsDebuggerPresent,,,,
S0009_0009,TRO00099,sandbox_timing_check,57,sandbox_evasion_stall,23931,GetTickCount,,,,