| sample_id,family_id,event_type,timestep,execution_phase,target_pid,api_call_name,registry_key_path,file_path_mutated,network_dst_ip_class,dns_query_domain_class |
| S0000_0000,RAN00000,uac_bypass_attempted,6,persistence_establishment,41963,CreateServiceW,,,, |
| S0000_0000,RAN00000,dropper_executed,22,initial_drop,16917,ShellExecuteW,,/var/run/sample_2990.sh,, |
| S0000_0000,RAN00000,dropper_executed,33,initial_drop,3755,WriteFile,,C:\Windows\Temp\sample_5722.bin,, |
| S0000_0000,RAN00000,privilege_token_stolen,40,privilege_escalation,37850,OpenProcessToken,,,, |
| S0000_0000,RAN00000,c2_beacon_sent,43,c2_communication,1753,InternetReadFile,,,unknown_public,dga_generated |
| S0000_0000,RAN00000,lateral_smb_spread,46,lateral_movement,20700,NetShareEnum,,,tor_exit_node, |
| S0000_0000,RAN00000,av_signature_evaded,48,dormancy_dwell,9259,WaitForSingleObject,,,, |
| S0000_0001,BOT00001,dropper_executed,0,payload_execution,49372,VirtualAllocEx,,C:\Users\Public\sample_4680.ps1,, |
| S0000_0001,BOT00001,data_staged_for_exfil,1,data_exfiltration,23463,send,,C:\Users\Public\sample_8421.ps1,, |
| S0000_0001,BOT00001,sandbox_timing_check,12,sandbox_evasion_stall,63923,IsDebuggerPresent,,,, |
| S0000_0001,BOT00001,persistence_registry_written,18,lateral_movement,61068,WMIExecMethod,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0001,BOT00001,c2_beacon_sent,21,c2_communication,20378,InternetReadFile,,,known_c2_infra,known_malicious |
| S0000_0001,BOT00001,dropper_executed,22,initial_drop,43043,WinExec,,C:\Users\Public\sample_4985.exe,, |
| S0000_0001,BOT00001,data_staged_for_exfil,23,data_exfiltration,56335,send,,/var/run/sample_2665.exe,, |
| S0000_0001,BOT00001,payload_ransomware_encrypt,29,payload_execution,28065,CreateThread,,,, |
| S0000_0001,BOT00001,heuristic_alert_triggered,32,dormancy_dwell,43053,WaitForSingleObject,,,, |
| S0000_0001,BOT00001,heuristic_alert_triggered,40,persistence_establishment,51432,StartupFolder,,,, |
| S0000_0001,BOT00001,lateral_smb_spread,44,sandbox_evasion_stall,27251,Sleep,,,cdn_provider, |
| S0000_0001,BOT00001,lateral_smb_spread,46,lateral_movement,49389,NetShareEnum,,,tor_exit_node, |
| S0000_0001,BOT00001,payload_ransomware_encrypt,50,payload_execution,17216,WriteProcessMemory,,,, |
| S0000_0001,BOT00001,persistence_registry_written,54,persistence_establishment,18244,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0002,CRY00002,persistence_registry_written,10,initial_drop,1876,CreateFileW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0000_0002,CRY00002,sandbox_timing_check,15,sandbox_evasion_stall,27973,Sleep,,,, |
| S0000_0002,CRY00002,av_signature_evaded,27,dormancy_dwell,50346,WaitForSingleObject,,,, |
| S0000_0002,CRY00002,exfil_dns_tunnel,35,data_exfiltration,40166,HttpSendRequestW,,,,legitimate_tld |
| S0000_0002,CRY00002,payload_ransomware_encrypt,38,privilege_escalation,55871,AdjustTokenPrivileges,,,, |
| S0000_0002,CRY00002,payload_cryptominer_spawned,41,dormancy_dwell,31469,NtDelayExecution,,,, |
| S0000_0002,CRY00002,payload_cryptominer_spawned,47,c2_communication,45081,WSAConnect,,,, |
| S0000_0003,SPY00003,persistence_registry_written,0,persistence_establishment,56726,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0000_0003,SPY00003,sandbox_timing_check,3,initial_drop,30173,WriteFile,,,, |
| S0000_0003,SPY00003,dropper_executed,7,initial_drop,13597,CreateFileW,,/var/run/sample_9629.dll,, |
| S0000_0003,SPY00003,definitive_detection,14,persistence_establishment,29933,SchtasksCreate,,,, |
| S0000_0003,SPY00003,c2_beacon_sent,22,c2_communication,10863,WSAConnect,,,unknown_public,subdomain_c2 |
| S0000_0003,SPY00003,payload_ransomware_encrypt,39,payload_execution,16791,WriteProcessMemory,,,, |
| S0000_0003,SPY00003,data_staged_for_exfil,41,data_exfiltration,64927,InternetOpenW,,C:\Users\Public\sample_6292.bin,, |
| S0000_0003,SPY00003,exfil_dns_tunnel,49,initial_drop,57931,WriteFile,,,,subdomain_c2 |
| S0000_0003,SPY00003,av_signature_evaded,52,dormancy_dwell,26812,SetTimer,,,, |
| S0000_0004,SPY00004,definitive_detection,2,data_exfiltration,47936,HttpSendRequestW,,,, |
| S0000_0004,SPY00004,exfil_https_c2,5,privilege_escalation,59997,BypassUAC,,,legitimate_cloud, |
| S0000_0004,SPY00004,self_delete_executed,9,self_destruct_cleanup,49034,RegDeleteKeyW,,/var/run/sample_6408.dll,, |
| S0000_0004,SPY00004,data_staged_for_exfil,11,data_exfiltration,27518,DnsQuery_W,,/home/user/.config/sample_5975.dll,, |
| S0000_0004,SPY00004,definitive_detection,15,sandbox_evasion_stall,51588,Sleep,,,, |
| S0000_0004,SPY00004,persistence_registry_written,21,persistence_establishment,30235,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0000_0004,SPY00004,privilege_token_stolen,22,privilege_escalation,52014,AdjustTokenPrivileges,,,, |
| S0000_0004,SPY00004,c2_beacon_sent,23,c2_communication,59138,WSAConnect,,,legitimate_cloud,legitimate_tld |
| S0000_0004,SPY00004,exfil_dns_tunnel,28,self_destruct_cleanup,3014,SHFileOperationW,,,,dga_generated |
| S0000_0004,SPY00004,self_delete_executed,29,self_destruct_cleanup,16920,DeleteFileW,,/var/run/sample_1761.sh,, |
| S0000_0004,SPY00004,c2_beacon_sent,33,payload_execution,19718,WriteProcessMemory,,,tor_exit_node,legitimate_tld |
| S0000_0004,SPY00004,sandbox_timing_check,35,sandbox_evasion_stall,6024,GetTickCount,,,, |
| S0000_0004,SPY00004,payload_ransomware_encrypt,47,payload_execution,56339,CreateThread,,,, |
| S0000_0004,SPY00004,c2_beacon_sent,51,data_exfiltration,3250,InternetOpenW,,,known_c2_infra,dga_generated |
| S0000_0004,SPY00004,payload_ransomware_encrypt,53,c2_communication,29895,recv,,,, |
| S0000_0004,SPY00004,payload_ransomware_encrypt,54,payload_execution,22348,VirtualAllocEx,,,, |
| S0000_0004,SPY00004,payload_keylogger_active,55,initial_drop,29767,ShellExecuteW,,,, |
| S0000_0004,SPY00004,privilege_token_stolen,56,privilege_escalation,4087,ImpersonateLoggedOnUser,,,, |
| S0000_0005,APT00005,lateral_smb_spread,2,lateral_movement,51059,WNetAddConnection2W,,,known_c2_infra, |
| S0000_0005,APT00005,data_staged_for_exfil,8,lateral_movement,43901,NetShareEnum,,/home/user/.config/sample_7354.bin,, |
| S0000_0005,APT00005,payload_ransomware_encrypt,13,payload_execution,54178,LoadLibraryA,,,, |
| S0000_0005,APT00005,self_delete_executed,22,self_destruct_cleanup,4011,SHFileOperationW,,/home/user/.config/sample_8678.sh,, |
| S0000_0005,APT00005,definitive_detection,23,sandbox_evasion_stall,56734,Sleep,,,, |
| S0000_0005,APT00005,data_staged_for_exfil,27,payload_execution,49053,VirtualAllocEx,,/home/user/.config/sample_5641.sh,, |
| S0000_0005,APT00005,exfil_dns_tunnel,28,payload_execution,26271,VirtualAllocEx,,,,dga_generated |
| S0000_0005,APT00005,payload_ransomware_encrypt,40,payload_execution,10111,LoadLibraryA,,,, |
| S0000_0005,APT00005,sandbox_timing_check,44,sandbox_evasion_stall,22114,Sleep,,,, |
| S0000_0005,APT00005,c2_beacon_sent,50,c2_communication,61418,connect,,,private_rfc1918,dga_generated |
| S0000_0005,APT00005,sandbox_timing_check,56,sandbox_evasion_stall,56551,IsDebuggerPresent,,,, |
| S0000_0006,RAN00006,persistence_registry_written,2,persistence_establishment,47354,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0000_0006,RAN00006,dropper_executed,14,initial_drop,15285,ShellExecuteW,,/home/user/.config/sample_4633.exe,, |
| S0000_0006,RAN00006,c2_beacon_sent,21,c2_communication,12267,WSAConnect,,,tor_exit_node,subdomain_c2 |
| S0000_0006,RAN00006,data_staged_for_exfil,45,data_exfiltration,43355,InternetOpenW,,/tmp/sample_3006.sh,, |
| S0000_0006,RAN00006,lateral_smb_spread,51,lateral_movement,58328,WMIExecMethod,,,private_rfc1918, |
| S0000_0006,RAN00006,data_staged_for_exfil,52,data_exfiltration,46055,HttpSendRequestW,,/var/run/sample_3509.sh,, |
| S0000_0006,RAN00006,dropper_executed,54,initial_drop,56085,CreateFileW,,C:\ProgramData\sample_4405.ps1,, |
| S0000_0007,CRY00007,data_staged_for_exfil,0,data_exfiltration,42130,HttpSendRequestW,,/home/user/.config/sample_9920.dll,, |
| S0000_0007,CRY00007,persistence_registry_written,2,persistence_establishment,31916,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0007,CRY00007,privilege_token_stolen,4,privilege_escalation,11829,AdjustTokenPrivileges,,,, |
| S0000_0007,CRY00007,sandbox_timing_check,8,sandbox_evasion_stall,18034,CheckRemoteDebuggerPresent,,,, |
| S0000_0007,CRY00007,self_delete_executed,15,self_destruct_cleanup,43198,RemoveDirectoryW,,/home/user/.config/sample_8472.dll,, |
| S0000_0007,CRY00007,sandbox_timing_check,18,sandbox_evasion_stall,38413,CheckRemoteDebuggerPresent,,,, |
| S0000_0007,CRY00007,exfil_dns_tunnel,19,lateral_movement,5773,WNetAddConnection2W,,,,known_malicious |
| S0000_0007,CRY00007,privilege_token_stolen,25,privilege_escalation,36852,AdjustTokenPrivileges,,,, |
| S0000_0007,CRY00007,persistence_registry_written,26,persistence_establishment,50740,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0007,CRY00007,self_delete_executed,36,self_destruct_cleanup,50808,SHFileOperationW,,C:\ProgramData\sample_3817.bat,, |
| S0000_0007,CRY00007,persistence_registry_written,38,persistence_establishment,18977,RegSetValueExW,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0007,CRY00007,self_delete_executed,48,self_destruct_cleanup,51825,RegDeleteKeyW,,/var/run/sample_1868.bat,, |
| S0000_0007,CRY00007,lateral_smb_spread,49,persistence_establishment,34981,SchtasksCreate,,,private_rfc1918, |
| S0000_0007,CRY00007,privilege_token_stolen,50,c2_communication,57480,connect,,,, |
| S0000_0007,CRY00007,lateral_smb_spread,59,lateral_movement,32042,CreateRemoteThread,,,legitimate_cloud, |
| S0000_0008,ROO00008,data_staged_for_exfil,0,data_exfiltration,5408,send,,C:\Windows\Temp\sample_6933.dll,, |
| S0000_0008,ROO00008,sandbox_timing_check,1,sandbox_evasion_stall,59361,IsDebuggerPresent,,,, |
| S0000_0008,ROO00008,dropper_executed,7,self_destruct_cleanup,20095,RegDeleteKeyW,,C:\Windows\Temp\sample_5575.sh,, |
| S0000_0008,ROO00008,av_signature_evaded,11,persistence_establishment,35660,SchtasksCreate,,,, |
| S0000_0008,ROO00008,sandbox_vm_artefact_check,30,sandbox_evasion_stall,10607,Sleep,,,, |
| S0000_0008,ROO00008,privilege_token_stolen,35,privilege_escalation,54787,OpenProcessToken,,,, |
| S0000_0008,ROO00008,data_staged_for_exfil,37,data_exfiltration,58491,InternetOpenW,,/var/run/sample_1498.ps1,, |
| S0000_0008,ROO00008,lateral_wmi_exec,44,sandbox_evasion_stall,38709,Sleep,,,, |
| S0000_0008,ROO00008,av_signature_evaded,54,dormancy_dwell,39734,GetSystemTime,,,, |
| S0000_0008,ROO00008,dropper_executed,57,initial_drop,57343,CreateFileW,,C:\Users\Public\sample_1981.sh,, |
| S0000_0008,ROO00008,c2_beacon_sent,58,c2_communication,47757,InternetReadFile,,,unknown_public,known_malicious |
| S0000_0008,ROO00008,privilege_token_stolen,59,privilege_escalation,46319,AdjustTokenPrivileges,,,, |
| S0000_0009,RAN00009,data_staged_for_exfil,1,lateral_movement,63896,WNetAddConnection2W,,C:\ProgramData\sample_6094.dll,, |
| S0000_0009,RAN00009,sandbox_timing_check,2,sandbox_evasion_stall,15706,GetTickCount,,,, |
| S0000_0009,RAN00009,payload_ransomware_encrypt,10,payload_execution,4763,CreateThread,,,, |
| S0000_0009,RAN00009,privilege_token_stolen,15,privilege_escalation,7971,BypassUAC,,,, |
| S0000_0009,RAN00009,privilege_token_stolen,18,privilege_escalation,59153,ImpersonateLoggedOnUser,,,, |
| S0000_0009,RAN00009,lateral_smb_spread,19,payload_execution,6522,LoadLibraryA,,,private_rfc1918, |
| S0000_0009,RAN00009,c2_beacon_sent,24,c2_communication,43847,InternetReadFile,,,tor_exit_node,recently_registered |
| S0000_0009,RAN00009,lateral_wmi_exec,28,payload_execution,41977,CreateThread,,,, |
| S0000_0009,RAN00009,self_delete_executed,30,self_destruct_cleanup,40940,SHFileOperationW,,C:\Windows\Temp\sample_3096.exe,, |
| S0000_0009,RAN00009,heuristic_alert_triggered,36,data_exfiltration,28166,InternetOpenW,,,, |
| S0000_0009,RAN00009,av_signature_evaded,37,dormancy_dwell,12446,GetSystemTime,,,, |
| S0000_0009,RAN00009,privilege_token_stolen,42,privilege_escalation,1972,ImpersonateLoggedOnUser,,,, |
| S0000_0009,RAN00009,persistence_registry_written,45,persistence_establishment,26150,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0000_0009,RAN00009,c2_beacon_sent,51,c2_communication,35547,connect,,,legitimate_cloud,legitimate_tld |
| S0000_0009,RAN00009,lateral_smb_spread,54,lateral_movement,44359,NetShareEnum,,,private_rfc1918, |
| S0000_0009,RAN00009,av_signature_evaded,57,dormancy_dwell,58232,SetTimer,,,, |
| S0001_0000,FIL00010,sandbox_vm_artefact_check,4,initial_drop,61382,ShellExecuteW,,,, |
| S0001_0000,FIL00010,lateral_wmi_exec,11,self_destruct_cleanup,3517,RegDeleteKeyW,,,, |
| S0001_0000,FIL00010,persistence_scheduled_task,17,dormancy_dwell,17903,NtDelayExecution,,,, |
| S0001_0000,FIL00010,payload_ransomware_encrypt,19,payload_execution,50452,VirtualAllocEx,,,, |
| S0001_0000,FIL00010,persistence_registry_written,25,persistence_establishment,15812,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0001_0000,FIL00010,lateral_smb_spread,28,persistence_establishment,64452,CreateServiceW,,,unknown_public, |
| S0001_0000,FIL00010,dropper_executed,30,initial_drop,4418,ShellExecuteW,,C:\Windows\Temp\sample_7538.ps1,, |
| S0001_0000,FIL00010,data_staged_for_exfil,32,c2_communication,44858,connect,,C:\ProgramData\sample_2978.exe,, |
| S0001_0000,FIL00010,dropper_executed,33,initial_drop,19111,CreateFileW,,/home/user/.config/sample_3553.bat,, |
| S0001_0000,FIL00010,persistence_registry_written,41,persistence_establishment,19691,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0001_0000,FIL00010,anti_debug_triggered,43,payload_execution,61785,WriteProcessMemory,,,, |
| S0001_0000,FIL00010,heuristic_alert_triggered,45,persistence_establishment,56986,StartupFolder,,,, |
| S0001_0000,FIL00010,persistence_registry_written,50,persistence_establishment,54311,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0001_0000,FIL00010,c2_beacon_sent,54,c2_communication,14890,recv,,,private_rfc1918,legitimate_tld |
| S0001_0000,FIL00010,definitive_detection,55,data_exfiltration,64288,DnsQuery_W,,,, |
| S0001_0000,FIL00010,privilege_token_stolen,59,privilege_escalation,13383,BypassUAC,,,, |
| S0001_0001,DRO00011,self_delete_executed,7,initial_drop,31781,WinExec,,/tmp/sample_3650.exe,, |
| S0001_0001,DRO00011,sandbox_timing_check,22,sandbox_evasion_stall,36752,IsDebuggerPresent,,,, |
| S0001_0001,DRO00011,privilege_token_stolen,31,privilege_escalation,44584,ImpersonateLoggedOnUser,,,, |
| S0001_0001,DRO00011,dll_sideloading_executed,33,persistence_establishment,13085,StartupFolder,,C:\Windows\Temp\sample_2379.dll,, |
| S0001_0001,DRO00011,av_signature_evaded,38,dormancy_dwell,36298,NtDelayExecution,,,, |
| S0001_0001,DRO00011,sandbox_timing_check,40,sandbox_evasion_stall,22849,GetTickCount,,,, |
| S0001_0001,DRO00011,payload_ransomware_encrypt,47,payload_execution,53118,CreateThread,,,, |
| S0001_0001,DRO00011,persistence_registry_written,53,persistence_establishment,62203,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0001_0001,DRO00011,sandbox_vm_artefact_check,56,data_exfiltration,65213,DnsQuery_W,,,, |
| S0001_0002,BOT00012,exfil_dns_tunnel,0,sandbox_evasion_stall,8533,Sleep,,,,legitimate_tld |
| S0001_0002,BOT00012,sandbox_timing_check,9,sandbox_evasion_stall,29119,IsDebuggerPresent,,,, |
| S0001_0002,BOT00012,lateral_smb_spread,25,lateral_movement,31984,WMIExecMethod,,,known_c2_infra, |
| S0001_0002,BOT00012,persistence_registry_written,31,persistence_establishment,8353,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0001_0002,BOT00012,data_staged_for_exfil,37,data_exfiltration,46988,InternetOpenW,,/var/run/sample_9581.dll,, |
| S0001_0002,BOT00012,privilege_token_stolen,55,initial_drop,24801,WinExec,,,, |
| S0001_0002,BOT00012,av_signature_evaded,58,dormancy_dwell,64404,WaitForSingleObject,,,, |
| S0001_0003,BOT00013,self_delete_executed,13,self_destruct_cleanup,51105,RemoveDirectoryW,,C:\ProgramData\sample_8909.exe,, |
| S0001_0003,BOT00013,sandbox_timing_check,14,sandbox_evasion_stall,31646,Sleep,,,, |
| S0001_0003,BOT00013,self_delete_executed,20,self_destruct_cleanup,56939,RegDeleteKeyW,,/tmp/sample_2543.bat,, |
| S0001_0003,BOT00013,self_delete_executed,23,self_destruct_cleanup,19684,SHFileOperationW,,/var/run/sample_9757.bin,, |
| S0001_0003,BOT00013,dropper_executed,24,initial_drop,55257,WinExec,,C:\Windows\Temp\sample_8548.bat,, |
| S0001_0003,BOT00013,privilege_token_stolen,28,privilege_escalation,4168,OpenProcessToken,,,, |
| S0001_0003,BOT00013,heuristic_alert_triggered,41,sandbox_evasion_stall,50191,GetTickCount,,,, |
| S0001_0003,BOT00013,persistence_scheduled_task,53,self_destruct_cleanup,55605,DeleteFileW,,,, |
| S0001_0003,BOT00013,c2_beacon_sent,54,c2_communication,13924,recv,,,private_rfc1918,dga_generated |
| S0001_0003,BOT00013,persistence_registry_written,55,persistence_establishment,49089,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0001_0003,BOT00013,sandbox_timing_check,58,sandbox_evasion_stall,34455,Sleep,,,, |
| S0001_0004,BOT00014,sandbox_timing_check,0,sandbox_evasion_stall,57810,Sleep,,,, |
| S0001_0004,BOT00014,av_signature_evaded,1,dormancy_dwell,38313,SetTimer,,,, |
| S0001_0004,BOT00014,dropper_executed,4,initial_drop,5518,WinExec,,C:\ProgramData\sample_5699.bin,, |
| S0001_0004,BOT00014,payload_ransomware_encrypt,5,payload_execution,47153,WriteProcessMemory,,,, |
| S0001_0004,BOT00014,heuristic_alert_triggered,9,persistence_establishment,44863,CreateServiceW,,,, |
| S0001_0004,BOT00014,payload_ransomware_encrypt,28,payload_execution,38479,VirtualAllocEx,,,, |
| S0001_0004,BOT00014,data_staged_for_exfil,36,data_exfiltration,13731,InternetOpenW,,/tmp/sample_7643.ps1,, |
| S0001_0004,BOT00014,c2_beacon_sent,42,c2_communication,10458,WSAConnect,,,private_rfc1918,known_malicious |
| S0001_0004,BOT00014,av_signature_evaded,45,dormancy_dwell,35905,SetTimer,,,, |
| S0001_0004,BOT00014,data_staged_for_exfil,49,data_exfiltration,46229,DnsQuery_W,,C:\Users\Public\sample_6986.bin,, |
| S0001_0004,BOT00014,uac_bypass_attempted,50,dormancy_dwell,16455,WaitForSingleObject,,,, |
| S0001_0004,BOT00014,payload_ransomware_encrypt,55,payload_execution,34830,VirtualAllocEx,,,, |
| S0001_0005,BOT00015,lateral_smb_spread,6,lateral_movement,13486,CreateRemoteThread,,,private_rfc1918, |
| S0001_0005,BOT00015,self_delete_executed,13,self_destruct_cleanup,22482,RegDeleteKeyW,,C:\Windows\Temp\sample_4283.bin,, |
| S0001_0005,BOT00015,privilege_token_stolen,23,privilege_escalation,64899,OpenProcessToken,,,, |
| S0001_0005,BOT00015,dropper_executed,35,initial_drop,13613,CreateFileW,,C:\Users\Public\sample_5281.sh,, |
| S0001_0005,BOT00015,privilege_token_stolen,37,privilege_escalation,9228,BypassUAC,,,, |
| S0001_0005,BOT00015,av_signature_evaded,49,dormancy_dwell,13272,NtDelayExecution,,,, |
| S0001_0005,BOT00015,lateral_smb_spread,54,c2_communication,41700,WSAConnect,,,private_rfc1918, |
| S0001_0005,BOT00015,lateral_wmi_exec,57,privilege_escalation,57038,OpenProcessToken,,,, |
| S0001_0005,BOT00015,privilege_token_stolen,58,privilege_escalation,62764,ImpersonateLoggedOnUser,,,, |
| S0001_0006,FIL00016,sandbox_timing_check,16,sandbox_evasion_stall,38524,Sleep,,,, |
| S0001_0006,FIL00016,av_signature_evaded,29,dormancy_dwell,10379,NtDelayExecution,,,, |
| S0001_0006,FIL00016,sandbox_timing_check,34,sandbox_evasion_stall,32570,Sleep,,,, |
| S0001_0006,FIL00016,privilege_token_stolen,35,privilege_escalation,1069,AdjustTokenPrivileges,,,, |
| S0001_0006,FIL00016,dropper_executed,36,initial_drop,26474,CreateFileW,,C:\Windows\Temp\sample_4557.ps1,, |
| S0001_0006,FIL00016,data_staged_for_exfil,46,data_exfiltration,3945,send,,/home/user/.config/sample_5037.bin,, |
| S0001_0006,FIL00016,self_delete_executed,56,self_destruct_cleanup,26256,RemoveDirectoryW,,C:\ProgramData\sample_7248.exe,, |
| S0001_0006,FIL00016,payload_ransomware_encrypt,59,payload_execution,54467,CreateThread,,,, |
| S0001_0007,TRO00017,payload_ransomware_encrypt,1,payload_execution,34351,WriteProcessMemory,,,, |
| S0001_0007,TRO00017,persistence_registry_written,9,persistence_establishment,50773,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0001_0007,TRO00017,lateral_smb_spread,19,lateral_movement,3311,CreateRemoteThread,,,legitimate_cloud, |
| S0001_0007,TRO00017,sandbox_vm_artefact_check,26,initial_drop,48540,WriteFile,,,, |
| S0001_0007,TRO00017,heuristic_alert_triggered,31,privilege_escalation,41357,AdjustTokenPrivileges,,,, |
| S0001_0007,TRO00017,privilege_token_stolen,36,privilege_escalation,47700,BypassUAC,,,, |
| S0001_0007,TRO00017,persistence_registry_written,41,persistence_establishment,54719,CreateServiceW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0001_0007,TRO00017,data_staged_for_exfil,43,data_exfiltration,23381,send,,/tmp/sample_2187.sh,, |
| S0001_0007,TRO00017,self_delete_executed,45,self_destruct_cleanup,61082,SHFileOperationW,,/tmp/sample_2162.bat,, |
| S0001_0007,TRO00017,persistence_registry_written,47,persistence_establishment,4256,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0001_0007,TRO00017,anti_debug_triggered,49,lateral_movement,54075,NetShareEnum,,,, |
| S0001_0007,TRO00017,data_staged_for_exfil,51,data_exfiltration,32891,send,,C:\Users\Public\sample_7741.bat,, |
| S0001_0007,TRO00017,uac_bypass_attempted,56,payload_execution,4603,CreateThread,,,, |
| S0001_0008,APT00018,c2_command_received,2,privilege_escalation,59269,BypassUAC,,,private_rfc1918, |
| S0001_0008,APT00018,payload_cryptominer_spawned,3,dormancy_dwell,50244,GetSystemTime,,,, |
| S0001_0008,APT00018,payload_ransomware_encrypt,4,lateral_movement,12761,CreateRemoteThread,,,, |
| S0001_0008,APT00018,av_signature_evaded,16,dormancy_dwell,26820,NtDelayExecution,,,, |
| S0001_0008,APT00018,self_delete_executed,20,self_destruct_cleanup,39728,DeleteFileW,,C:\Windows\Temp\sample_1404.exe,, |
| S0001_0008,APT00018,dropper_executed,27,initial_drop,24891,CreateFileW,,/home/user/.config/sample_1707.dll,, |
| S0001_0008,APT00018,c2_command_received,30,data_exfiltration,21859,HttpSendRequestW,,,private_rfc1918, |
| S0001_0008,APT00018,heuristic_alert_triggered,31,lateral_movement,37387,CreateRemoteThread,,,, |
| S0001_0008,APT00018,av_signature_evaded,34,dormancy_dwell,48669,NtDelayExecution,,,, |
| S0001_0008,APT00018,payload_ransomware_encrypt,39,payload_execution,39070,CreateThread,,,, |
| S0001_0008,APT00018,payload_keylogger_active,48,lateral_movement,22028,CreateRemoteThread,,,, |
| S0001_0008,APT00018,sandbox_timing_check,56,sandbox_evasion_stall,20453,GetTickCount,,,, |
| S0001_0009,SPY00019,sandbox_timing_check,7,sandbox_evasion_stall,26500,CheckRemoteDebuggerPresent,,,, |
| S0001_0009,SPY00019,data_staged_for_exfil,32,data_exfiltration,62042,send,,C:\Windows\Temp\sample_4812.dll,, |
| S0001_0009,SPY00019,dropper_executed,41,initial_drop,9460,WriteFile,,/var/run/sample_3574.sh,, |
| S0001_0009,SPY00019,data_staged_for_exfil,42,data_exfiltration,5887,HttpSendRequestW,,C:\ProgramData\sample_1006.exe,, |
| S0001_0009,SPY00019,uac_bypass_attempted,47,payload_execution,3432,LoadLibraryA,,,, |
| S0001_0009,SPY00019,dropper_executed,50,initial_drop,13015,WinExec,,C:\Windows\Temp\sample_1926.ps1,, |
| S0002_0000,FIL00020,av_signature_evaded,2,persistence_establishment,47383,CreateServiceW,,,, |
| S0002_0000,FIL00020,av_signature_evaded,11,sandbox_evasion_stall,8438,IsDebuggerPresent,,,, |
| S0002_0000,FIL00020,heuristic_alert_triggered,13,payload_execution,15296,CreateThread,,,, |
| S0002_0000,FIL00020,lateral_smb_spread,34,lateral_movement,8983,NetShareEnum,,,legitimate_cloud, |
| S0002_0000,FIL00020,persistence_registry_written,38,persistence_establishment,2984,StartupFolder,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0002_0000,FIL00020,lateral_smb_spread,47,lateral_movement,46262,WMIExecMethod,,,private_rfc1918, |
| S0002_0000,FIL00020,persistence_registry_written,48,payload_execution,49811,VirtualAllocEx,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0002_0000,FIL00020,dropper_executed,49,initial_drop,11877,WriteFile,,C:\Users\Public\sample_7728.bin,, |
| S0002_0000,FIL00020,lateral_smb_spread,58,lateral_movement,12168,WMIExecMethod,,,private_rfc1918, |
| S0002_0001,WOR00021,data_staged_for_exfil,1,data_exfiltration,61922,HttpSendRequestW,,C:\Users\Public\sample_2297.bin,, |
| S0002_0001,WOR00021,data_staged_for_exfil,4,data_exfiltration,50618,DnsQuery_W,,C:\Windows\Temp\sample_6354.sh,, |
| S0002_0001,WOR00021,self_delete_executed,10,self_destruct_cleanup,50894,DeleteFileW,,/tmp/sample_4001.exe,, |
| S0002_0001,WOR00021,privilege_token_stolen,13,privilege_escalation,23578,AdjustTokenPrivileges,,,, |
| S0002_0001,WOR00021,privilege_token_stolen,16,privilege_escalation,17400,AdjustTokenPrivileges,,,, |
| S0002_0001,WOR00021,dropper_executed,23,initial_drop,39973,WriteFile,,C:\Windows\Temp\sample_2448.bin,, |
| S0002_0001,WOR00021,av_signature_evaded,27,dormancy_dwell,38442,NtDelayExecution,,,, |
| S0002_0001,WOR00021,payload_ransomware_encrypt,29,payload_execution,18430,CreateThread,,,, |
| S0002_0001,WOR00021,exfil_https_c2,32,self_destruct_cleanup,13923,RemoveDirectoryW,,,legitimate_cloud, |
| S0002_0001,WOR00021,av_signature_evaded,36,dormancy_dwell,24059,WaitForSingleObject,,,, |
| S0002_0001,WOR00021,persistence_registry_written,37,persistence_establishment,41424,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0002_0001,WOR00021,lateral_smb_spread,46,lateral_movement,3965,WMIExecMethod,,,cdn_provider, |
| S0002_0001,WOR00021,sandbox_timing_check,49,sandbox_evasion_stall,20691,GetTickCount,,,, |
| S0002_0001,WOR00021,data_staged_for_exfil,51,payload_execution,20146,WriteProcessMemory,,C:\Users\Public\sample_9656.bat,, |
| S0002_0001,WOR00021,data_staged_for_exfil,52,data_exfiltration,30583,InternetOpenW,,/var/run/sample_5471.bin,, |
| S0002_0001,WOR00021,dropper_executed,58,initial_drop,63997,WriteFile,,C:\Users\Public\sample_8180.sh,, |
| S0002_0002,TRO00022,c2_beacon_sent,7,c2_communication,50532,recv,,,tor_exit_node,subdomain_c2 |
| S0002_0002,TRO00022,exfil_https_c2,8,self_destruct_cleanup,28997,RegDeleteKeyW,,,cdn_provider, |
| S0002_0002,TRO00022,exfil_https_c2,10,c2_communication,63707,recv,,,cdn_provider, |
| S0002_0002,TRO00022,data_staged_for_exfil,20,data_exfiltration,23212,send,,/tmp/sample_1351.bat,, |
| S0002_0002,TRO00022,data_staged_for_exfil,33,data_exfiltration,59381,send,,/var/run/sample_3193.sh,, |
| S0002_0002,TRO00022,persistence_registry_written,38,persistence_establishment,15879,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0002_0002,TRO00022,data_staged_for_exfil,40,data_exfiltration,14964,send,,C:\Windows\Temp\sample_8541.bat,, |
| S0002_0002,TRO00022,av_signature_evaded,45,dormancy_dwell,18706,GetSystemTime,,,, |
| S0002_0002,TRO00022,av_signature_evaded,57,dormancy_dwell,3190,SetTimer,,,, |
| S0002_0002,TRO00022,av_signature_evaded,58,initial_drop,21749,CreateFileW,,,, |
| S0002_0003,DRO00023,av_signature_evaded,4,dormancy_dwell,35460,GetSystemTime,,,, |
| S0002_0003,DRO00023,persistence_registry_written,17,persistence_establishment,60141,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0002_0003,DRO00023,persistence_registry_written,25,persistence_establishment,47445,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0002_0003,DRO00023,privilege_token_stolen,30,privilege_escalation,18127,AdjustTokenPrivileges,,,, |
| S0002_0003,DRO00023,data_staged_for_exfil,36,data_exfiltration,48133,HttpSendRequestW,,C:\Windows\Temp\sample_3011.ps1,, |
| S0002_0003,DRO00023,dropper_executed,44,initial_drop,36667,WinExec,,C:\Users\Public\sample_8379.exe,, |
| S0002_0003,DRO00023,sandbox_timing_check,57,sandbox_evasion_stall,15822,CheckRemoteDebuggerPresent,,,, |
| S0002_0004,BOT00024,av_signature_evaded,2,dormancy_dwell,23842,SetTimer,,,, |
| S0002_0004,BOT00024,av_signature_evaded,4,lateral_movement,36520,WNetAddConnection2W,,,, |
| S0002_0004,BOT00024,privilege_token_stolen,13,privilege_escalation,18120,AdjustTokenPrivileges,,,, |
| S0002_0004,BOT00024,dropper_executed,22,initial_drop,58631,WriteFile,,/tmp/sample_7100.ps1,, |
| S0002_0004,BOT00024,self_delete_executed,31,self_destruct_cleanup,35226,RegDeleteKeyW,,C:\ProgramData\sample_2016.exe,, |
| S0002_0004,BOT00024,dropper_executed,33,initial_drop,33708,CreateFileW,,/home/user/.config/sample_1956.dll,, |
| S0002_0004,BOT00024,payload_ransomware_encrypt,41,self_destruct_cleanup,35498,RegDeleteKeyW,,,, |
| S0002_0004,BOT00024,data_staged_for_exfil,43,data_exfiltration,49464,send,,/tmp/sample_8468.sh,, |
| S0002_0004,BOT00024,c2_beacon_sent,55,c2_communication,57767,InternetReadFile,,,private_rfc1918,recently_registered |
| S0002_0004,BOT00024,sandbox_timing_check,59,sandbox_evasion_stall,11252,IsDebuggerPresent,,,, |
| S0002_0005,CRY00025,privilege_token_stolen,0,privilege_escalation,32205,ImpersonateLoggedOnUser,,,, |
| S0002_0005,CRY00025,c2_beacon_sent,1,c2_communication,46434,recv,,,private_rfc1918,known_malicious |
| S0002_0005,CRY00025,sandbox_timing_check,2,sandbox_evasion_stall,17627,GetTickCount,,,, |
| S0002_0005,CRY00025,self_delete_executed,11,self_destruct_cleanup,27255,SHFileOperationW,,C:\Windows\Temp\sample_1031.bin,, |
| S0002_0005,CRY00025,persistence_scheduled_task,36,persistence_establishment,19005,RegSetValueExW,,,, |
| S0002_0005,CRY00025,uac_bypass_attempted,42,dormancy_dwell,60618,GetSystemTime,,,, |
| S0002_0005,CRY00025,data_staged_for_exfil,57,data_exfiltration,12029,DnsQuery_W,,/var/run/sample_3721.bat,, |
| S0002_0006,SPY00026,c2_command_received,9,sandbox_evasion_stall,1367,Sleep,,,tor_exit_node, |
| S0002_0006,SPY00026,privilege_token_stolen,16,lateral_movement,65065,WNetAddConnection2W,,,, |
| S0002_0006,SPY00026,av_signature_evaded,18,dormancy_dwell,11548,NtDelayExecution,,,, |
| S0002_0006,SPY00026,sandbox_timing_check,23,sandbox_evasion_stall,56140,IsDebuggerPresent,,,, |
| S0002_0006,SPY00026,dll_sideloading_executed,43,persistence_establishment,62447,SchtasksCreate,,/home/user/.config/sample_9073.bat,, |
| S0002_0006,SPY00026,payload_ransomware_encrypt,47,payload_execution,12809,CreateThread,,,, |
| S0002_0007,APT00027,privilege_token_stolen,1,privilege_escalation,30854,ImpersonateLoggedOnUser,,,, |
| S0002_0007,APT00027,av_signature_evaded,15,dormancy_dwell,9996,WaitForSingleObject,,,, |
| S0002_0007,APT00027,lateral_smb_spread,17,lateral_movement,36760,WMIExecMethod,,,legitimate_cloud, |
| S0002_0007,APT00027,lateral_smb_spread,21,c2_communication,33725,connect,,,unknown_public, |
| S0002_0007,APT00027,av_signature_evaded,22,sandbox_evasion_stall,32069,Sleep,,,, |
| S0002_0007,APT00027,dropper_executed,28,initial_drop,41710,WriteFile,,C:\Windows\Temp\sample_2058.sh,, |
| S0002_0007,APT00027,data_staged_for_exfil,35,payload_execution,17623,CreateThread,,C:\ProgramData\sample_4834.bat,, |
| S0002_0007,APT00027,self_delete_executed,40,self_destruct_cleanup,35813,DeleteFileW,,/tmp/sample_4298.bin,, |
| S0002_0007,APT00027,data_staged_for_exfil,42,data_exfiltration,63086,InternetOpenW,,C:\ProgramData\sample_4123.exe,, |
| S0002_0007,APT00027,dropper_executed,44,initial_drop,28263,WinExec,,/home/user/.config/sample_5183.ps1,, |
| S0002_0007,APT00027,av_signature_evaded,48,dormancy_dwell,24201,WaitForSingleObject,,,, |
| S0002_0007,APT00027,data_staged_for_exfil,51,data_exfiltration,27436,HttpSendRequestW,,/tmp/sample_9762.exe,, |
| S0002_0008,FIL00028,payload_ransomware_encrypt,4,payload_execution,18300,VirtualAllocEx,,,, |
| S0002_0008,FIL00028,lateral_smb_spread,8,lateral_movement,46620,CreateRemoteThread,,,unknown_public, |
| S0002_0008,FIL00028,lateral_smb_spread,9,c2_communication,36663,WSAConnect,,,cdn_provider, |
| S0002_0008,FIL00028,sandbox_vm_artefact_check,26,sandbox_evasion_stall,20684,CheckRemoteDebuggerPresent,,,, |
| S0002_0008,FIL00028,dll_sideloading_executed,30,data_exfiltration,29487,DnsQuery_W,,C:\ProgramData\sample_2432.exe,, |
| S0002_0008,FIL00028,privilege_token_stolen,34,c2_communication,34179,connect,,,, |
| S0002_0008,FIL00028,sandbox_timing_check,41,sandbox_evasion_stall,45875,Sleep,,,, |
| S0002_0008,FIL00028,c2_beacon_sent,42,c2_communication,48079,WSAConnect,,,known_c2_infra,legitimate_tld |
| S0002_0008,FIL00028,self_delete_executed,53,self_destruct_cleanup,17360,SHFileOperationW,,C:\Windows\Temp\sample_2300.sh,, |
| S0002_0008,FIL00028,payload_ransomware_encrypt,55,payload_execution,8227,CreateThread,,,, |
| S0002_0008,FIL00028,self_delete_executed,57,self_destruct_cleanup,11820,DeleteFileW,,/home/user/.config/sample_7023.ps1,, |
| S0002_0009,SPY00029,data_staged_for_exfil,7,data_exfiltration,62121,HttpSendRequestW,,/var/run/sample_3533.dll,, |
| S0002_0009,SPY00029,self_delete_executed,17,self_destruct_cleanup,44951,DeleteFileW,,/var/run/sample_1180.bat,, |
| S0002_0009,SPY00029,dropper_executed,27,initial_drop,65099,WriteFile,,/home/user/.config/sample_5429.ps1,, |
| S0002_0009,SPY00029,payload_ransomware_encrypt,29,payload_execution,1197,CreateThread,,,, |
| S0002_0009,SPY00029,payload_cryptominer_spawned,32,data_exfiltration,41083,HttpSendRequestW,,,, |
| S0002_0009,SPY00029,sandbox_timing_check,40,sandbox_evasion_stall,52405,IsDebuggerPresent,,,, |
| S0002_0009,SPY00029,lateral_smb_spread,48,lateral_movement,44481,NetShareEnum,,,legitimate_cloud, |
| S0002_0009,SPY00029,payload_ransomware_encrypt,52,payload_execution,62705,CreateThread,,,, |
| S0002_0009,SPY00029,persistence_registry_written,57,persistence_establishment,20184,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0003_0000,SPY00030,av_signature_evaded,6,dormancy_dwell,2646,GetSystemTime,,,, |
| S0003_0000,SPY00030,lateral_smb_spread,21,lateral_movement,50968,WMIExecMethod,,,cdn_provider, |
| S0003_0000,SPY00030,persistence_scheduled_task,27,privilege_escalation,43434,BypassUAC,,,, |
| S0003_0000,SPY00030,c2_beacon_sent,32,c2_communication,56649,WSAConnect,,,private_rfc1918,legitimate_tld |
| S0003_0000,SPY00030,persistence_registry_written,39,persistence_establishment,13247,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0003_0000,SPY00030,data_staged_for_exfil,43,data_exfiltration,61186,send,,C:\Users\Public\sample_1373.bat,, |
| S0003_0000,SPY00030,sandbox_timing_check,51,sandbox_evasion_stall,23421,GetTickCount,,,, |
| S0003_0000,SPY00030,av_signature_evaded,55,dormancy_dwell,15961,GetSystemTime,,,, |
| S0003_0000,SPY00030,payload_ransomware_encrypt,58,payload_execution,17289,CreateThread,,,, |
| S0003_0001,ROO00031,dropper_executed,2,initial_drop,28245,CreateFileW,,C:\Windows\Temp\sample_4273.exe,, |
| S0003_0001,ROO00031,persistence_registry_written,18,persistence_establishment,63606,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0003_0001,ROO00031,payload_ransomware_encrypt,21,payload_execution,27272,WriteProcessMemory,,,, |
| S0003_0001,ROO00031,dropper_executed,34,initial_drop,49201,ShellExecuteW,,C:\Users\Public\sample_7980.dll,, |
| S0003_0001,ROO00031,privilege_token_stolen,35,privilege_escalation,11320,OpenProcessToken,,,, |
| S0003_0001,ROO00031,privilege_token_stolen,42,data_exfiltration,39741,InternetOpenW,,,, |
| S0003_0001,ROO00031,sandbox_vm_artefact_check,54,lateral_movement,54183,NetShareEnum,,,, |
| S0003_0001,ROO00031,c2_beacon_sent,56,c2_communication,46065,InternetReadFile,,,cdn_provider,known_malicious |
| S0003_0001,ROO00031,av_signature_evaded,57,privilege_escalation,15266,AdjustTokenPrivileges,,,, |
| S0003_0002,RAN00032,payload_ransomware_encrypt,6,payload_execution,38404,LoadLibraryA,,,, |
| S0003_0002,RAN00032,sandbox_timing_check,10,sandbox_evasion_stall,59216,CheckRemoteDebuggerPresent,,,, |
| S0003_0002,RAN00032,c2_beacon_sent,11,c2_communication,40606,InternetReadFile,,,legitimate_cloud,dga_generated |
| S0003_0002,RAN00032,self_delete_executed,24,self_destruct_cleanup,15703,SHFileOperationW,,C:\Users\Public\sample_7202.sh,, |
| S0003_0002,RAN00032,sandbox_timing_check,35,sandbox_evasion_stall,62138,CheckRemoteDebuggerPresent,,,, |
| S0003_0002,RAN00032,lateral_smb_spread,40,lateral_movement,52179,CreateRemoteThread,,,known_c2_infra, |
| S0003_0002,RAN00032,c2_beacon_sent,41,persistence_establishment,28742,SchtasksCreate,,,cdn_provider,known_malicious |
| S0003_0002,RAN00032,privilege_token_stolen,42,privilege_escalation,41073,ImpersonateLoggedOnUser,,,, |
| S0003_0002,RAN00032,exfil_https_c2,48,self_destruct_cleanup,4673,SHFileOperationW,,,cdn_provider, |
| S0003_0002,RAN00032,self_delete_executed,53,self_destruct_cleanup,15389,DeleteFileW,,C:\ProgramData\sample_9097.sh,, |
| S0003_0002,RAN00032,lateral_smb_spread,55,lateral_movement,56066,WMIExecMethod,,,cdn_provider, |
| S0003_0002,RAN00032,payload_ransomware_encrypt,58,payload_execution,57614,LoadLibraryA,,,, |
| S0003_0003,FIL00033,payload_keylogger_active,4,lateral_movement,33152,WNetAddConnection2W,,,, |
| S0003_0003,FIL00033,data_staged_for_exfil,5,data_exfiltration,42764,HttpSendRequestW,,/home/user/.config/sample_7138.exe,, |
| S0003_0003,FIL00033,dropper_executed,10,initial_drop,29839,WinExec,,/tmp/sample_6430.dll,, |
| S0003_0003,FIL00033,anti_debug_triggered,13,dormancy_dwell,20976,WaitForSingleObject,,,, |
| S0003_0003,FIL00033,exfil_https_c2,17,persistence_establishment,25272,CreateServiceW,,,cdn_provider, |
| S0003_0003,FIL00033,persistence_registry_written,26,persistence_establishment,54925,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0003_0003,FIL00033,av_signature_evaded,27,c2_communication,23790,InternetReadFile,,,, |
| S0003_0003,FIL00033,av_signature_evaded,43,initial_drop,56861,CreateFileW,,,, |
| S0003_0003,FIL00033,data_staged_for_exfil,53,data_exfiltration,5389,DnsQuery_W,,/var/run/sample_2195.dll,, |
| S0003_0003,FIL00033,privilege_token_stolen,59,lateral_movement,21248,CreateRemoteThread,,,, |
| S0003_0004,APT00034,persistence_registry_written,7,persistence_establishment,59131,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0003_0004,APT00034,sandbox_timing_check,9,sandbox_evasion_stall,54763,IsDebuggerPresent,,,, |
| S0003_0004,APT00034,data_staged_for_exfil,10,data_exfiltration,4156,HttpSendRequestW,,/home/user/.config/sample_9971.ps1,, |
| S0003_0004,APT00034,c2_beacon_sent,19,c2_communication,27811,InternetReadFile,,,cdn_provider,known_malicious |
| S0003_0004,APT00034,privilege_token_stolen,20,privilege_escalation,41563,OpenProcessToken,,,, |
| S0003_0004,APT00034,definitive_detection,24,privilege_escalation,48182,ImpersonateLoggedOnUser,,,, |
| S0003_0004,APT00034,persistence_registry_written,26,persistence_establishment,37320,CreateServiceW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0003_0004,APT00034,lateral_smb_spread,34,lateral_movement,64133,NetShareEnum,,,known_c2_infra, |
| S0003_0004,APT00034,self_delete_executed,35,self_destruct_cleanup,44743,SHFileOperationW,,C:\Users\Public\sample_6672.bin,, |
| S0003_0004,APT00034,data_staged_for_exfil,36,dormancy_dwell,58129,SetTimer,,C:\Windows\Temp\sample_4728.bat,, |
| S0003_0004,APT00034,dll_sideloading_executed,38,lateral_movement,8749,WNetAddConnection2W,,/tmp/sample_6769.ps1,, |
| S0003_0004,APT00034,sandbox_timing_check,39,sandbox_evasion_stall,44613,IsDebuggerPresent,,,, |
| S0003_0004,APT00034,c2_beacon_sent,54,c2_communication,37989,InternetReadFile,,,private_rfc1918,known_malicious |
| S0003_0005,RAN00035,c2_beacon_sent,2,c2_communication,30176,recv,,,cdn_provider,dga_generated |
| S0003_0005,RAN00035,c2_beacon_sent,25,c2_communication,21422,InternetReadFile,,,legitimate_cloud,legitimate_tld |
| S0003_0005,RAN00035,privilege_token_stolen,33,privilege_escalation,40272,OpenProcessToken,,,, |
| S0003_0005,RAN00035,privilege_token_stolen,36,payload_execution,35905,LoadLibraryA,,,, |
| S0003_0005,RAN00035,privilege_token_stolen,37,privilege_escalation,36873,AdjustTokenPrivileges,,,, |
| S0003_0005,RAN00035,self_delete_executed,39,self_destruct_cleanup,62564,RegDeleteKeyW,,C:\Users\Public\sample_1320.bin,, |
| S0003_0006,APT00036,privilege_token_stolen,3,privilege_escalation,10843,OpenProcessToken,,,, |
| S0003_0006,APT00036,data_staged_for_exfil,4,data_exfiltration,11600,DnsQuery_W,,/tmp/sample_9697.bat,, |
| S0003_0006,APT00036,c2_beacon_sent,6,c2_communication,38240,InternetReadFile,,,known_c2_infra,legitimate_tld |
| S0003_0006,APT00036,payload_ransomware_encrypt,8,payload_execution,53113,CreateThread,,,, |
| S0003_0006,APT00036,uac_bypass_attempted,10,initial_drop,30746,CreateFileW,,,, |
| S0003_0006,APT00036,persistence_registry_written,17,persistence_establishment,14153,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0003_0006,APT00036,av_signature_evaded,37,dormancy_dwell,30430,SetTimer,,,, |
| S0003_0006,APT00036,sandbox_timing_check,41,sandbox_evasion_stall,31077,CheckRemoteDebuggerPresent,,,, |
| S0003_0006,APT00036,payload_ransomware_encrypt,42,dormancy_dwell,48649,NtDelayExecution,,,, |
| S0003_0006,APT00036,exfil_https_c2,48,persistence_establishment,28959,RegSetValueExW,,,private_rfc1918, |
| S0003_0006,APT00036,anti_debug_triggered,50,lateral_movement,8727,NetShareEnum,,,, |
| S0003_0006,APT00036,payload_cryptominer_spawned,52,self_destruct_cleanup,20434,SHFileOperationW,,,, |
| S0003_0006,APT00036,data_staged_for_exfil,53,data_exfiltration,42441,HttpSendRequestW,,C:\Users\Public\sample_1700.ps1,, |
| S0003_0006,APT00036,sandbox_timing_check,59,sandbox_evasion_stall,37015,Sleep,,,, |
| S0003_0007,APT00037,exfil_https_c2,1,c2_communication,59689,recv,,,known_c2_infra, |
| S0003_0007,APT00037,c2_beacon_sent,17,c2_communication,53172,connect,,,tor_exit_node,legitimate_tld |
| S0003_0007,APT00037,self_delete_executed,20,self_destruct_cleanup,27145,SHFileOperationW,,/var/run/sample_7800.sh,, |
| S0003_0007,APT00037,privilege_token_stolen,24,privilege_escalation,63623,OpenProcessToken,,,, |
| S0003_0007,APT00037,payload_ransomware_encrypt,29,payload_execution,30227,CreateThread,,,, |
| S0003_0007,APT00037,sandbox_timing_check,37,sandbox_evasion_stall,57491,GetTickCount,,,, |
| S0003_0007,APT00037,data_staged_for_exfil,44,payload_execution,64918,WriteProcessMemory,,/home/user/.config/sample_7162.dll,, |
| S0003_0007,APT00037,sandbox_timing_check,54,sandbox_evasion_stall,58696,GetTickCount,,,, |
| S0003_0007,APT00037,anti_debug_triggered,56,initial_drop,2073,ShellExecuteW,,,, |
| S0003_0007,APT00037,dropper_executed,57,initial_drop,35728,WinExec,,C:\Windows\Temp\sample_8543.bin,, |
| S0003_0008,ROO00038,sandbox_timing_check,0,sandbox_evasion_stall,48512,GetTickCount,,,, |
| S0003_0008,ROO00038,c2_beacon_sent,2,c2_communication,47681,InternetReadFile,,,legitimate_cloud,recently_registered |
| S0003_0008,ROO00038,c2_beacon_sent,6,c2_communication,33280,WSAConnect,,,unknown_public,subdomain_c2 |
| S0003_0008,ROO00038,c2_beacon_sent,11,c2_communication,8549,InternetReadFile,,,cdn_provider,legitimate_tld |
| S0003_0008,ROO00038,c2_beacon_sent,21,c2_communication,36684,recv,,,known_c2_infra,dga_generated |
| S0003_0008,ROO00038,dropper_executed,25,initial_drop,17801,ShellExecuteW,,C:\Users\Public\sample_7882.exe,, |
| S0003_0008,ROO00038,payload_ransomware_encrypt,27,payload_execution,4142,WriteProcessMemory,,,, |
| S0003_0008,ROO00038,privilege_token_stolen,29,privilege_escalation,43992,BypassUAC,,,, |
| S0003_0008,ROO00038,lateral_smb_spread,31,lateral_movement,39403,CreateRemoteThread,,,unknown_public, |
| S0003_0008,ROO00038,payload_ransomware_encrypt,32,payload_execution,26526,CreateThread,,,, |
| S0003_0008,ROO00038,sandbox_vm_artefact_check,35,persistence_establishment,45100,StartupFolder,,,, |
| S0003_0008,ROO00038,c2_beacon_sent,38,c2_communication,5475,WSAConnect,,,private_rfc1918,dga_generated |
| S0003_0008,ROO00038,data_staged_for_exfil,39,data_exfiltration,50861,HttpSendRequestW,,C:\Windows\Temp\sample_6026.exe,, |
| S0003_0008,ROO00038,payload_ransomware_encrypt,42,payload_execution,56474,VirtualAllocEx,,,, |
| S0003_0008,ROO00038,sandbox_timing_check,49,sandbox_evasion_stall,21361,GetTickCount,,,, |
| S0003_0008,ROO00038,dropper_executed,50,initial_drop,7785,WriteFile,,C:\ProgramData\sample_1515.dll,, |
| S0003_0009,CRY00039,av_signature_evaded,2,dormancy_dwell,47537,SetTimer,,,, |
| S0003_0009,CRY00039,c2_beacon_sent,10,c2_communication,47566,InternetReadFile,,,cdn_provider,known_malicious |
| S0003_0009,CRY00039,sandbox_timing_check,21,sandbox_evasion_stall,53369,Sleep,,,, |
| S0003_0009,CRY00039,exfil_https_c2,24,self_destruct_cleanup,19153,DeleteFileW,,,legitimate_cloud, |
| S0003_0009,CRY00039,persistence_registry_written,27,persistence_establishment,63185,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0003_0009,CRY00039,self_delete_executed,31,self_destruct_cleanup,44785,RegDeleteKeyW,,/var/run/sample_9065.exe,, |
| S0003_0009,CRY00039,privilege_token_stolen,34,privilege_escalation,48305,BypassUAC,,,, |
| S0003_0009,CRY00039,data_staged_for_exfil,42,data_exfiltration,5790,DnsQuery_W,,C:\ProgramData\sample_4572.sh,, |
| S0003_0009,CRY00039,c2_beacon_sent,43,c2_communication,50376,recv,,,legitimate_cloud,legitimate_tld |
| S0003_0009,CRY00039,sandbox_timing_check,48,sandbox_evasion_stall,14353,Sleep,,,, |
| S0003_0009,CRY00039,data_staged_for_exfil,54,data_exfiltration,35454,DnsQuery_W,,/home/user/.config/sample_8556.sh,, |
| S0004_0000,TRO00040,lateral_smb_spread,12,lateral_movement,64850,WMIExecMethod,,,known_c2_infra, |
| S0004_0000,TRO00040,privilege_token_stolen,21,privilege_escalation,31279,ImpersonateLoggedOnUser,,,, |
| S0004_0000,TRO00040,sandbox_timing_check,29,sandbox_evasion_stall,28564,GetTickCount,,,, |
| S0004_0000,TRO00040,av_signature_evaded,38,dormancy_dwell,22222,NtDelayExecution,,,, |
| S0004_0000,TRO00040,c2_beacon_sent,50,c2_communication,27569,WSAConnect,,,known_c2_infra,subdomain_c2 |
| S0004_0000,TRO00040,sandbox_timing_check,51,sandbox_evasion_stall,7389,IsDebuggerPresent,,,, |
| S0004_0001,BOT00041,persistence_registry_written,3,persistence_establishment,27733,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0004_0001,BOT00041,self_delete_executed,7,self_destruct_cleanup,59658,SHFileOperationW,,C:\ProgramData\sample_7049.exe,, |
| S0004_0001,BOT00041,payload_ransomware_encrypt,13,payload_execution,60520,WriteProcessMemory,,,, |
| S0004_0001,BOT00041,self_delete_executed,16,self_destruct_cleanup,2765,DeleteFileW,,/tmp/sample_9007.exe,, |
| S0004_0001,BOT00041,c2_beacon_sent,25,c2_communication,38036,recv,,,legitimate_cloud,legitimate_tld |
| S0004_0001,BOT00041,persistence_registry_written,30,persistence_establishment,4889,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0004_0001,BOT00041,payload_ransomware_encrypt,32,payload_execution,32710,LoadLibraryA,,,, |
| S0004_0001,BOT00041,payload_cryptominer_spawned,36,persistence_establishment,2581,SchtasksCreate,,,, |
| S0004_0001,BOT00041,persistence_scheduled_task,38,lateral_movement,26471,NetShareEnum,,,, |
| S0004_0001,BOT00041,dropper_executed,41,initial_drop,6169,ShellExecuteW,,/var/run/sample_4136.ps1,, |
| S0004_0001,BOT00041,lateral_smb_spread,45,lateral_movement,53828,CreateRemoteThread,,,private_rfc1918, |
| S0004_0001,BOT00041,persistence_registry_written,51,persistence_establishment,2890,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0004_0001,BOT00041,c2_beacon_sent,52,c2_communication,55374,recv,,,private_rfc1918,recently_registered |
| S0004_0002,BOT00042,self_delete_executed,0,self_destruct_cleanup,11178,RegDeleteKeyW,,/tmp/sample_1309.bin,, |
| S0004_0002,BOT00042,data_staged_for_exfil,2,data_exfiltration,42724,HttpSendRequestW,,C:\Windows\Temp\sample_6095.ps1,, |
| S0004_0002,BOT00042,self_delete_executed,3,self_destruct_cleanup,41971,DeleteFileW,,C:\Windows\Temp\sample_5836.exe,, |
| S0004_0002,BOT00042,privilege_token_stolen,8,privilege_escalation,24585,OpenProcessToken,,,, |
| S0004_0002,BOT00042,lateral_smb_spread,15,lateral_movement,53020,WNetAddConnection2W,,,legitimate_cloud, |
| S0004_0002,BOT00042,data_staged_for_exfil,16,data_exfiltration,64799,InternetOpenW,,/var/run/sample_9456.ps1,, |
| S0004_0002,BOT00042,c2_command_received,18,self_destruct_cleanup,3575,DeleteFileW,,,cdn_provider, |
| S0004_0002,BOT00042,privilege_token_stolen,27,privilege_escalation,65356,OpenProcessToken,,,, |
| S0004_0002,BOT00042,c2_beacon_sent,28,c2_communication,58476,connect,,,cdn_provider,dga_generated |
| S0004_0002,BOT00042,av_signature_evaded,31,dormancy_dwell,62476,NtDelayExecution,,,, |
| S0004_0002,BOT00042,data_staged_for_exfil,33,sandbox_evasion_stall,27910,GetTickCount,,/var/run/sample_9585.bat,, |
| S0004_0002,BOT00042,lateral_smb_spread,38,lateral_movement,25315,CreateRemoteThread,,,known_c2_infra, |
| S0004_0002,BOT00042,privilege_token_stolen,52,privilege_escalation,25555,AdjustTokenPrivileges,,,, |
| S0004_0002,BOT00042,lateral_smb_spread,54,lateral_movement,49532,CreateRemoteThread,,,cdn_provider, |
| S0004_0002,BOT00042,c2_beacon_sent,57,c2_communication,32848,InternetReadFile,,,tor_exit_node,recently_registered |
| S0004_0003,WOR00043,c2_beacon_sent,9,c2_communication,35603,InternetReadFile,,,known_c2_infra,legitimate_tld |
| S0004_0003,WOR00043,c2_beacon_sent,23,c2_communication,30168,InternetReadFile,,,cdn_provider,subdomain_c2 |
| S0004_0003,WOR00043,dropper_executed,52,initial_drop,52976,ShellExecuteW,,/var/run/sample_1446.exe,, |
| S0004_0004,RAN00044,persistence_registry_written,11,persistence_establishment,32676,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0004_0004,RAN00044,privilege_token_stolen,20,privilege_escalation,34369,OpenProcessToken,,,, |
| S0004_0004,RAN00044,anti_debug_triggered,34,payload_execution,7377,LoadLibraryA,,,, |
| S0004_0004,RAN00044,persistence_registry_written,40,persistence_establishment,20389,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0004_0004,RAN00044,av_signature_evaded,47,dormancy_dwell,48025,SetTimer,,,, |
| S0004_0004,RAN00044,data_staged_for_exfil,54,data_exfiltration,41292,DnsQuery_W,,/home/user/.config/sample_6397.sh,, |
| S0004_0005,DRO00045,persistence_registry_written,3,payload_execution,25302,CreateThread,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0004_0005,DRO00045,privilege_token_stolen,4,privilege_escalation,40017,ImpersonateLoggedOnUser,,,, |
| S0004_0005,DRO00045,payload_ransomware_encrypt,5,payload_execution,24640,CreateThread,,,, |
| S0004_0005,DRO00045,data_staged_for_exfil,11,data_exfiltration,10726,send,,/tmp/sample_4228.exe,, |
| S0004_0005,DRO00045,privilege_token_stolen,27,privilege_escalation,16532,BypassUAC,,,, |
| S0004_0005,DRO00045,self_delete_executed,33,self_destruct_cleanup,18935,RemoveDirectoryW,,/home/user/.config/sample_1882.ps1,, |
| S0004_0005,DRO00045,lateral_smb_spread,41,lateral_movement,33749,WMIExecMethod,,,private_rfc1918, |
| S0004_0005,DRO00045,exfil_https_c2,43,payload_execution,42639,VirtualAllocEx,,,unknown_public, |
| S0004_0005,DRO00045,heuristic_alert_triggered,52,lateral_movement,19096,CreateRemoteThread,,,, |
| S0004_0005,DRO00045,uac_bypass_attempted,56,lateral_movement,52522,NetShareEnum,,,, |
| S0004_0005,DRO00045,anti_debug_triggered,59,privilege_escalation,3342,ImpersonateLoggedOnUser,,,, |
| S0004_0006,SPY00046,dropper_executed,4,initial_drop,59318,WriteFile,,C:\ProgramData\sample_6017.bat,, |
| S0004_0006,SPY00046,sandbox_timing_check,6,sandbox_evasion_stall,1472,Sleep,,,, |
| S0004_0006,SPY00046,uac_bypass_attempted,9,sandbox_evasion_stall,60267,GetTickCount,,,, |
| S0004_0006,SPY00046,anti_debug_triggered,12,data_exfiltration,24540,HttpSendRequestW,,,, |
| S0004_0006,SPY00046,c2_beacon_sent,15,c2_communication,56163,WSAConnect,,,private_rfc1918,recently_registered |
| S0004_0006,SPY00046,exfil_dns_tunnel,27,sandbox_evasion_stall,40828,CheckRemoteDebuggerPresent,,,,known_malicious |
| S0004_0006,SPY00046,payload_ransomware_encrypt,33,payload_execution,46850,WriteProcessMemory,,,, |
| S0004_0006,SPY00046,c2_beacon_sent,45,c2_communication,45911,connect,,,private_rfc1918,recently_registered |
| S0004_0006,SPY00046,sandbox_vm_artefact_check,49,sandbox_evasion_stall,53731,Sleep,,,, |
| S0004_0006,SPY00046,dropper_executed,53,initial_drop,5312,WinExec,,/var/run/sample_2296.exe,, |
| S0004_0006,SPY00046,payload_ransomware_encrypt,54,payload_execution,46122,LoadLibraryA,,,, |
| S0004_0006,SPY00046,persistence_registry_written,59,persistence_establishment,20280,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0004_0007,APT00047,lateral_smb_spread,11,lateral_movement,28367,WNetAddConnection2W,,,tor_exit_node, |
| S0004_0007,APT00047,c2_beacon_sent,13,c2_communication,30019,InternetReadFile,,,tor_exit_node,legitimate_tld |
| S0004_0007,APT00047,lateral_smb_spread,32,lateral_movement,43237,NetShareEnum,,,private_rfc1918, |
| S0004_0007,APT00047,data_staged_for_exfil,35,data_exfiltration,20822,InternetOpenW,,/tmp/sample_4545.ps1,, |
| S0004_0007,APT00047,av_signature_evaded,46,dormancy_dwell,43778,WaitForSingleObject,,,, |
| S0004_0007,APT00047,data_staged_for_exfil,48,data_exfiltration,14018,send,,/var/run/sample_3779.exe,, |
| S0004_0007,APT00047,payload_ransomware_encrypt,56,persistence_establishment,16952,SchtasksCreate,,,, |
| S0004_0008,CRY00048,data_staged_for_exfil,3,data_exfiltration,11406,send,,C:\ProgramData\sample_1074.dll,, |
| S0004_0008,CRY00048,c2_beacon_sent,22,c2_communication,58140,WSAConnect,,,cdn_provider,legitimate_tld |
| S0004_0008,CRY00048,dropper_executed,23,c2_communication,60114,WSAConnect,,C:\Users\Public\sample_8069.bat,, |
| S0004_0008,CRY00048,payload_ransomware_encrypt,24,payload_execution,62818,LoadLibraryA,,,, |
| S0004_0008,CRY00048,self_delete_executed,31,self_destruct_cleanup,25140,RemoveDirectoryW,,C:\Users\Public\sample_8825.bin,, |
| S0004_0008,CRY00048,lotl_binary_abused,32,initial_drop,51649,ShellExecuteW,,,, |
| S0004_0008,CRY00048,lotl_binary_abused,38,payload_execution,26989,CreateThread,,,, |
| S0004_0008,CRY00048,payload_ransomware_encrypt,42,payload_execution,49794,WriteProcessMemory,,,, |
| S0004_0008,CRY00048,lateral_smb_spread,55,lateral_movement,52375,WMIExecMethod,,,legitimate_cloud, |
| S0004_0009,BOT00049,sandbox_timing_check,16,sandbox_evasion_stall,27628,Sleep,,,, |
| S0004_0009,BOT00049,persistence_registry_written,26,persistence_establishment,45025,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0004_0009,BOT00049,process_hollowing_executed,29,self_destruct_cleanup,13207,DeleteFileW,,,, |
| S0004_0009,BOT00049,lateral_smb_spread,32,dormancy_dwell,37678,GetSystemTime,,,private_rfc1918, |
| S0004_0009,BOT00049,data_staged_for_exfil,34,data_exfiltration,57950,DnsQuery_W,,/tmp/sample_9885.exe,, |
| S0004_0009,BOT00049,c2_beacon_sent,40,c2_communication,25145,recv,,,private_rfc1918,legitimate_tld |
| S0004_0009,BOT00049,persistence_registry_written,42,persistence_establishment,65496,SchtasksCreate,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0004_0009,BOT00049,sandbox_timing_check,44,sandbox_evasion_stall,42488,GetTickCount,,,, |
| S0004_0009,BOT00049,av_signature_evaded,51,dormancy_dwell,54252,WaitForSingleObject,,,, |
| S0004_0009,BOT00049,self_delete_executed,54,self_destruct_cleanup,64616,DeleteFileW,,/home/user/.config/sample_1466.ps1,, |
| S0004_0009,BOT00049,payload_keylogger_active,55,self_destruct_cleanup,26391,SHFileOperationW,,,, |
| S0004_0009,BOT00049,payload_ransomware_encrypt,58,privilege_escalation,63867,ImpersonateLoggedOnUser,,,, |
| S0005_0000,BOT00050,c2_beacon_sent,4,c2_communication,21469,connect,,,cdn_provider,dga_generated |
| S0005_0000,BOT00050,self_delete_executed,5,self_destruct_cleanup,51296,RemoveDirectoryW,,/var/run/sample_1578.bat,, |
| S0005_0000,BOT00050,dropper_executed,6,initial_drop,64750,WriteFile,,C:\Windows\Temp\sample_8676.bat,, |
| S0005_0000,BOT00050,anti_debug_triggered,8,sandbox_evasion_stall,25218,Sleep,,,, |
| S0005_0000,BOT00050,lateral_wmi_exec,11,initial_drop,19582,WriteFile,,,, |
| S0005_0000,BOT00050,sandbox_timing_check,12,sandbox_evasion_stall,9087,GetTickCount,,,, |
| S0005_0000,BOT00050,privilege_token_stolen,15,privilege_escalation,44841,ImpersonateLoggedOnUser,,,, |
| S0005_0000,BOT00050,exfil_https_c2,19,data_exfiltration,21132,send,,,private_rfc1918, |
| S0005_0000,BOT00050,persistence_registry_written,28,persistence_establishment,10107,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0005_0000,BOT00050,lateral_smb_spread,32,self_destruct_cleanup,40998,RemoveDirectoryW,,,cdn_provider, |
| S0005_0000,BOT00050,dropper_executed,36,initial_drop,32643,WinExec,,C:\Users\Public\sample_7797.bat,, |
| S0005_0000,BOT00050,data_staged_for_exfil,42,data_exfiltration,45066,send,,/home/user/.config/sample_9191.bin,, |
| S0005_0000,BOT00050,c2_beacon_sent,43,c2_communication,27868,WSAConnect,,,unknown_public,recently_registered |
| S0005_0000,BOT00050,definitive_detection,44,lateral_movement,1257,WNetAddConnection2W,,,, |
| S0005_0000,BOT00050,self_delete_executed,53,lateral_movement,54167,CreateRemoteThread,,/tmp/sample_5061.ps1,, |
| S0005_0001,TRO00051,av_signature_evaded,7,dormancy_dwell,51476,NtDelayExecution,,,, |
| S0005_0001,TRO00051,payload_ransomware_encrypt,10,payload_execution,59666,LoadLibraryA,,,, |
| S0005_0001,TRO00051,privilege_token_stolen,23,privilege_escalation,57128,BypassUAC,,,, |
| S0005_0001,TRO00051,lateral_smb_spread,24,lateral_movement,16170,WNetAddConnection2W,,,unknown_public, |
| S0005_0001,TRO00051,lateral_smb_spread,30,lateral_movement,5585,CreateRemoteThread,,,cdn_provider, |
| S0005_0001,TRO00051,c2_beacon_sent,32,c2_communication,48457,connect,,,tor_exit_node,legitimate_tld |
| S0005_0001,TRO00051,data_staged_for_exfil,33,data_exfiltration,50178,HttpSendRequestW,,C:\Windows\Temp\sample_6098.bat,, |
| S0005_0001,TRO00051,lateral_smb_spread,35,lateral_movement,42526,WMIExecMethod,,,known_c2_infra, |
| S0005_0001,TRO00051,payload_cryptominer_spawned,36,privilege_escalation,19473,ImpersonateLoggedOnUser,,,, |
| S0005_0001,TRO00051,dll_sideloading_executed,37,c2_communication,64380,InternetReadFile,,/home/user/.config/sample_6330.bin,, |
| S0005_0001,TRO00051,lateral_smb_spread,41,lateral_movement,58938,WMIExecMethod,,,tor_exit_node, |
| S0005_0001,TRO00051,lateral_smb_spread,42,lateral_movement,19175,WNetAddConnection2W,,,legitimate_cloud, |
| S0005_0001,TRO00051,data_staged_for_exfil,43,initial_drop,6411,ShellExecuteW,,/home/user/.config/sample_7217.exe,, |
| S0005_0001,TRO00051,exfil_dns_tunnel,48,c2_communication,19243,WSAConnect,,,,recently_registered |
| S0005_0001,TRO00051,privilege_token_stolen,52,privilege_escalation,9015,OpenProcessToken,,,, |
| S0005_0001,TRO00051,privilege_token_stolen,58,privilege_escalation,54002,BypassUAC,,,, |
| S0005_0001,TRO00051,lateral_smb_spread,59,lateral_movement,20694,WNetAddConnection2W,,,unknown_public, |
| S0005_0002,WOR00052,lateral_smb_spread,11,lateral_movement,11979,WNetAddConnection2W,,,private_rfc1918, |
| S0005_0002,WOR00052,av_signature_evaded,18,dormancy_dwell,16257,GetSystemTime,,,, |
| S0005_0002,WOR00052,self_delete_executed,26,self_destruct_cleanup,33679,DeleteFileW,,C:\Users\Public\sample_8384.bat,, |
| S0005_0002,WOR00052,sandbox_timing_check,29,sandbox_evasion_stall,39152,Sleep,,,, |
| S0005_0002,WOR00052,sandbox_timing_check,30,sandbox_evasion_stall,46273,Sleep,,,, |
| S0005_0002,WOR00052,payload_ransomware_encrypt,31,payload_execution,58567,WriteProcessMemory,,,, |
| S0005_0002,WOR00052,sandbox_timing_check,42,sandbox_evasion_stall,15124,GetTickCount,,,, |
| S0005_0002,WOR00052,data_staged_for_exfil,44,self_destruct_cleanup,54838,DeleteFileW,,C:\Users\Public\sample_2662.bat,, |
| S0005_0002,WOR00052,payload_ransomware_encrypt,45,payload_execution,57783,VirtualAllocEx,,,, |
| S0005_0002,WOR00052,privilege_token_stolen,59,privilege_escalation,38669,ImpersonateLoggedOnUser,,,, |
| S0005_0003,SPY00053,payload_ransomware_encrypt,9,privilege_escalation,59902,AdjustTokenPrivileges,,,, |
| S0005_0003,SPY00053,data_staged_for_exfil,11,data_exfiltration,33849,send,,C:\Windows\Temp\sample_3215.exe,, |
| S0005_0003,SPY00053,privilege_token_stolen,13,privilege_escalation,11350,OpenProcessToken,,,, |
| S0005_0003,SPY00053,self_delete_executed,20,self_destruct_cleanup,50238,SHFileOperationW,,C:\ProgramData\sample_8709.exe,, |
| S0005_0003,SPY00053,c2_beacon_sent,24,c2_communication,61223,recv,,,legitimate_cloud,legitimate_tld |
| S0005_0003,SPY00053,heuristic_alert_triggered,28,data_exfiltration,3912,DnsQuery_W,,,, |
| S0005_0003,SPY00053,dropper_executed,37,initial_drop,40166,CreateFileW,,C:\Users\Public\sample_7248.dll,, |
| S0005_0003,SPY00053,c2_beacon_sent,45,dormancy_dwell,58242,GetSystemTime,,,legitimate_cloud,legitimate_tld |
| S0005_0003,SPY00053,av_signature_evaded,47,dormancy_dwell,1823,WaitForSingleObject,,,, |
| S0005_0003,SPY00053,payload_ransomware_encrypt,49,payload_execution,45953,WriteProcessMemory,,,, |
| S0005_0003,SPY00053,lateral_smb_spread,57,dormancy_dwell,2315,NtDelayExecution,,,cdn_provider, |
| S0005_0004,SPY00054,anti_debug_triggered,1,privilege_escalation,26897,OpenProcessToken,,,, |
| S0005_0004,SPY00054,payload_ransomware_encrypt,3,persistence_establishment,8352,RegSetValueExW,,,, |
| S0005_0004,SPY00054,self_delete_executed,5,self_destruct_cleanup,41799,SHFileOperationW,,C:\ProgramData\sample_4227.bat,, |
| S0005_0004,SPY00054,sandbox_timing_check,19,sandbox_evasion_stall,23858,CheckRemoteDebuggerPresent,,,, |
| S0005_0004,SPY00054,persistence_registry_written,38,persistence_establishment,64407,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0005_0004,SPY00054,lateral_smb_spread,47,lateral_movement,60587,WNetAddConnection2W,,,known_c2_infra, |
| S0005_0004,SPY00054,av_signature_evaded,57,privilege_escalation,62279,BypassUAC,,,, |
| S0005_0004,SPY00054,process_hollowing_executed,58,dormancy_dwell,61237,GetSystemTime,,,, |
| S0005_0005,RAN00055,payload_ransomware_encrypt,8,payload_execution,33277,CreateThread,,,, |
| S0005_0005,RAN00055,data_staged_for_exfil,11,data_exfiltration,48214,send,,/var/run/sample_9865.bin,, |
| S0005_0005,RAN00055,data_staged_for_exfil,13,data_exfiltration,8155,InternetOpenW,,/home/user/.config/sample_6345.bin,, |
| S0005_0005,RAN00055,data_staged_for_exfil,18,data_exfiltration,47105,DnsQuery_W,,/tmp/sample_4303.sh,, |
| S0005_0005,RAN00055,av_signature_evaded,34,dormancy_dwell,53348,NtDelayExecution,,,, |
| S0005_0005,RAN00055,persistence_scheduled_task,38,data_exfiltration,51124,InternetOpenW,,,, |
| S0005_0005,RAN00055,sandbox_timing_check,42,sandbox_evasion_stall,22114,CheckRemoteDebuggerPresent,,,, |
| S0005_0005,RAN00055,lotl_binary_abused,44,persistence_establishment,12139,StartupFolder,,,, |
| S0005_0005,RAN00055,exfil_https_c2,45,c2_communication,44450,WSAConnect,,,private_rfc1918, |
| S0005_0005,RAN00055,payload_ransomware_encrypt,58,payload_execution,17181,LoadLibraryA,,,, |
| S0005_0006,FIL00056,lateral_smb_spread,3,lateral_movement,31739,NetShareEnum,,,legitimate_cloud, |
| S0005_0006,FIL00056,self_delete_executed,5,self_destruct_cleanup,55433,RemoveDirectoryW,,/var/run/sample_7277.sh,, |
| S0005_0006,FIL00056,lateral_smb_spread,10,persistence_establishment,20376,SchtasksCreate,,,private_rfc1918, |
| S0005_0006,FIL00056,av_signature_evaded,17,dormancy_dwell,44786,WaitForSingleObject,,,, |
| S0005_0006,FIL00056,persistence_registry_written,21,persistence_establishment,4617,CreateServiceW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0005_0006,FIL00056,payload_keylogger_active,23,privilege_escalation,24784,ImpersonateLoggedOnUser,,,, |
| S0005_0006,FIL00056,payload_ransomware_encrypt,24,payload_execution,17523,LoadLibraryA,,,, |
| S0005_0006,FIL00056,sandbox_vm_artefact_check,25,sandbox_evasion_stall,16534,GetTickCount,,,, |
| S0005_0006,FIL00056,av_signature_evaded,28,dormancy_dwell,54508,NtDelayExecution,,,, |
| S0005_0006,FIL00056,privilege_token_stolen,51,privilege_escalation,64545,OpenProcessToken,,,, |
| S0005_0007,TRO00057,lotl_binary_abused,1,dormancy_dwell,6339,GetSystemTime,,,, |
| S0005_0007,TRO00057,lateral_smb_spread,16,lateral_movement,20011,CreateRemoteThread,,,known_c2_infra, |
| S0005_0007,TRO00057,av_signature_evaded,19,dormancy_dwell,35234,NtDelayExecution,,,, |
| S0005_0007,TRO00057,self_delete_executed,23,self_destruct_cleanup,8569,DeleteFileW,,/var/run/sample_5840.ps1,, |
| S0005_0007,TRO00057,exfil_https_c2,27,data_exfiltration,31557,HttpSendRequestW,,,legitimate_cloud, |
| S0005_0007,TRO00057,sandbox_timing_check,35,dormancy_dwell,52928,WaitForSingleObject,,,, |
| S0005_0007,TRO00057,dll_sideloading_executed,37,c2_communication,22678,InternetReadFile,,/home/user/.config/sample_3711.bin,, |
| S0005_0007,TRO00057,sandbox_timing_check,38,sandbox_evasion_stall,25655,IsDebuggerPresent,,,, |
| S0005_0007,TRO00057,c2_beacon_sent,43,c2_communication,27021,recv,,,legitimate_cloud,legitimate_tld |
| S0005_0008,BOT00058,data_staged_for_exfil,0,data_exfiltration,14416,DnsQuery_W,,C:\Users\Public\sample_8403.bin,, |
| S0005_0008,BOT00058,av_signature_evaded,2,dormancy_dwell,50585,WaitForSingleObject,,,, |
| S0005_0008,BOT00058,self_delete_executed,5,self_destruct_cleanup,51099,DeleteFileW,,C:\Users\Public\sample_6335.sh,, |
| S0005_0008,BOT00058,lateral_smb_spread,6,c2_communication,29417,WSAConnect,,,cdn_provider, |
| S0005_0008,BOT00058,data_staged_for_exfil,14,payload_execution,27229,WriteProcessMemory,,C:\Users\Public\sample_8451.dll,, |
| S0005_0008,BOT00058,c2_beacon_sent,21,c2_communication,20560,recv,,,known_c2_infra,recently_registered |
| S0005_0008,BOT00058,data_staged_for_exfil,22,data_exfiltration,21216,send,,C:\Users\Public\sample_1179.exe,, |
| S0005_0008,BOT00058,persistence_scheduled_task,28,dormancy_dwell,2526,WaitForSingleObject,,,, |
| S0005_0008,BOT00058,payload_keylogger_active,31,c2_communication,9729,InternetReadFile,,,, |
| S0005_0008,BOT00058,lateral_smb_spread,32,lateral_movement,30520,WNetAddConnection2W,,,private_rfc1918, |
| S0005_0008,BOT00058,self_delete_executed,35,sandbox_evasion_stall,51930,IsDebuggerPresent,,C:\Users\Public\sample_9963.sh,, |
| S0005_0008,BOT00058,persistence_registry_written,38,persistence_establishment,39322,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0005_0008,BOT00058,uac_bypass_attempted,42,initial_drop,7319,WriteFile,,,, |
| S0005_0008,BOT00058,anti_debug_triggered,44,privilege_escalation,12454,ImpersonateLoggedOnUser,,,, |
| S0005_0008,BOT00058,uac_bypass_attempted,46,c2_communication,4300,InternetReadFile,,,, |
| S0005_0008,BOT00058,process_hollowing_executed,49,self_destruct_cleanup,62648,RegDeleteKeyW,,,, |
| S0005_0008,BOT00058,payload_ransomware_encrypt,55,payload_execution,5843,VirtualAllocEx,,,, |
| S0005_0008,BOT00058,persistence_scheduled_task,56,persistence_establishment,64536,CreateServiceW,,,, |
| S0005_0009,CRY00059,dropper_executed,0,initial_drop,32789,WriteFile,,C:\ProgramData\sample_2758.sh,, |
| S0005_0009,CRY00059,payload_ransomware_encrypt,3,payload_execution,54499,LoadLibraryA,,,, |
| S0005_0009,CRY00059,anti_debug_triggered,8,lateral_movement,32034,WMIExecMethod,,,, |
| S0005_0009,CRY00059,lateral_smb_spread,28,sandbox_evasion_stall,38478,Sleep,,,tor_exit_node, |
| S0005_0009,CRY00059,sandbox_timing_check,29,sandbox_evasion_stall,29179,Sleep,,,, |
| S0005_0009,CRY00059,privilege_token_stolen,44,privilege_escalation,41458,OpenProcessToken,,,, |
| S0005_0009,CRY00059,av_signature_evaded,48,dormancy_dwell,35959,NtDelayExecution,,,, |
| S0005_0009,CRY00059,lateral_wmi_exec,57,initial_drop,43970,CreateFileW,,,, |
| S0006_0000,DRO00060,lateral_wmi_exec,3,c2_communication,63443,connect,,,, |
| S0006_0000,DRO00060,sandbox_timing_check,4,sandbox_evasion_stall,23267,IsDebuggerPresent,,,, |
| S0006_0000,DRO00060,exfil_https_c2,6,c2_communication,53705,WSAConnect,,,tor_exit_node, |
| S0006_0000,DRO00060,lateral_smb_spread,12,lateral_movement,20626,WNetAddConnection2W,,,cdn_provider, |
| S0006_0000,DRO00060,dropper_executed,13,initial_drop,46440,WriteFile,,C:\ProgramData\sample_7171.dll,, |
| S0006_0000,DRO00060,heuristic_alert_triggered,14,sandbox_evasion_stall,11154,IsDebuggerPresent,,,, |
| S0006_0000,DRO00060,privilege_token_stolen,22,privilege_escalation,13270,BypassUAC,,,, |
| S0006_0000,DRO00060,definitive_detection,24,data_exfiltration,5982,send,,,, |
| S0006_0000,DRO00060,c2_beacon_sent,26,c2_communication,34365,InternetReadFile,,,known_c2_infra,subdomain_c2 |
| S0006_0000,DRO00060,exfil_dns_tunnel,27,persistence_establishment,24951,StartupFolder,,,,subdomain_c2 |
| S0006_0000,DRO00060,data_staged_for_exfil,29,data_exfiltration,42315,send,,C:\ProgramData\sample_1042.dll,, |
| S0006_0000,DRO00060,self_delete_executed,31,self_destruct_cleanup,2300,SHFileOperationW,,C:\Windows\Temp\sample_6498.bin,, |
| S0006_0000,DRO00060,dropper_executed,35,initial_drop,4328,WinExec,,C:\Windows\Temp\sample_6888.bin,, |
| S0006_0000,DRO00060,self_delete_executed,46,self_destruct_cleanup,64550,RegDeleteKeyW,,/tmp/sample_1461.ps1,, |
| S0006_0000,DRO00060,sandbox_timing_check,52,sandbox_evasion_stall,57001,GetTickCount,,,, |
| S0006_0000,DRO00060,dropper_executed,57,initial_drop,36168,WriteFile,,/var/run/sample_8629.bin,, |
| S0006_0000,DRO00060,lateral_smb_spread,58,lateral_movement,30766,WMIExecMethod,,,private_rfc1918, |
| S0006_0001,BOT00061,sandbox_timing_check,0,sandbox_evasion_stall,23030,CheckRemoteDebuggerPresent,,,, |
| S0006_0001,BOT00061,lateral_wmi_exec,2,privilege_escalation,33444,BypassUAC,,,, |
| S0006_0001,BOT00061,av_signature_evaded,14,dormancy_dwell,45731,NtDelayExecution,,,, |
| S0006_0001,BOT00061,definitive_detection,15,self_destruct_cleanup,35517,SHFileOperationW,,,, |
| S0006_0001,BOT00061,sandbox_timing_check,21,sandbox_evasion_stall,53524,Sleep,,,, |
| S0006_0001,BOT00061,sandbox_timing_check,35,sandbox_evasion_stall,13856,IsDebuggerPresent,,,, |
| S0006_0001,BOT00061,dropper_executed,37,initial_drop,10537,ShellExecuteW,,/home/user/.config/sample_2996.ps1,, |
| S0006_0001,BOT00061,sandbox_timing_check,50,sandbox_evasion_stall,25270,CheckRemoteDebuggerPresent,,,, |
| S0006_0001,BOT00061,c2_beacon_sent,56,c2_communication,25645,connect,,,private_rfc1918,subdomain_c2 |
| S0006_0001,BOT00061,definitive_detection,59,dormancy_dwell,61256,SetTimer,,,, |
| S0006_0002,WOR00062,av_signature_evaded,15,dormancy_dwell,15973,NtDelayExecution,,,, |
| S0006_0002,WOR00062,exfil_https_c2,17,data_exfiltration,27165,send,,,cdn_provider, |
| S0006_0002,WOR00062,process_hollowing_executed,19,c2_communication,19491,WSAConnect,,,, |
| S0006_0002,WOR00062,payload_ransomware_encrypt,27,payload_execution,25795,CreateThread,,,, |
| S0006_0002,WOR00062,payload_ransomware_encrypt,31,payload_execution,29445,CreateThread,,,, |
| S0006_0002,WOR00062,self_delete_executed,40,self_destruct_cleanup,52240,RegDeleteKeyW,,C:\ProgramData\sample_9867.sh,, |
| S0006_0002,WOR00062,persistence_registry_written,45,persistence_establishment,62089,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0006_0002,WOR00062,lotl_binary_abused,46,privilege_escalation,26751,ImpersonateLoggedOnUser,,,, |
| S0006_0003,DRO00063,process_hollowing_executed,3,dormancy_dwell,52030,NtDelayExecution,,,, |
| S0006_0003,DRO00063,c2_beacon_sent,6,c2_communication,19070,recv,,,tor_exit_node,legitimate_tld |
| S0006_0003,DRO00063,dll_sideloading_executed,14,sandbox_evasion_stall,57922,IsDebuggerPresent,,C:\Windows\Temp\sample_1113.sh,, |
| S0006_0003,DRO00063,av_signature_evaded,25,dormancy_dwell,41660,GetSystemTime,,,, |
| S0006_0003,DRO00063,payload_ransomware_encrypt,30,payload_execution,41827,WriteProcessMemory,,,, |
| S0006_0003,DRO00063,dropper_executed,39,initial_drop,35816,ShellExecuteW,,/var/run/sample_9858.sh,, |
| S0006_0003,DRO00063,definitive_detection,44,c2_communication,11008,connect,,,, |
| S0006_0003,DRO00063,heuristic_alert_triggered,46,dormancy_dwell,63225,SetTimer,,,, |
| S0006_0003,DRO00063,persistence_registry_written,52,persistence_establishment,27473,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0006_0003,DRO00063,self_delete_executed,56,self_destruct_cleanup,48055,DeleteFileW,,/var/run/sample_5115.bin,, |
| S0006_0004,SPY00064,lateral_wmi_exec,5,payload_execution,15108,WriteProcessMemory,,,, |
| S0006_0004,SPY00064,sandbox_timing_check,15,sandbox_evasion_stall,31054,CheckRemoteDebuggerPresent,,,, |
| S0006_0004,SPY00064,self_delete_executed,17,self_destruct_cleanup,18714,RegDeleteKeyW,,C:\Users\Public\sample_3695.dll,, |
| S0006_0004,SPY00064,c2_beacon_sent,18,c2_communication,6862,InternetReadFile,,,legitimate_cloud,recently_registered |
| S0006_0004,SPY00064,payload_keylogger_active,23,persistence_establishment,50787,SchtasksCreate,,,, |
| S0006_0004,SPY00064,heuristic_alert_triggered,28,persistence_establishment,62568,StartupFolder,,,, |
| S0006_0004,SPY00064,c2_beacon_sent,41,c2_communication,53645,recv,,,cdn_provider,recently_registered |
| S0006_0004,SPY00064,dropper_executed,44,initial_drop,43316,WriteFile,,C:\Users\Public\sample_1213.bat,, |
| S0006_0004,SPY00064,av_signature_evaded,47,lateral_movement,53049,CreateRemoteThread,,,, |
| S0006_0004,SPY00064,sandbox_timing_check,54,sandbox_evasion_stall,57254,CheckRemoteDebuggerPresent,,,, |
| S0006_0004,SPY00064,lotl_binary_abused,58,initial_drop,10963,WinExec,,,, |
| S0006_0005,WOR00065,av_signature_evaded,6,dormancy_dwell,46695,GetSystemTime,,,, |
| S0006_0005,WOR00065,av_signature_evaded,11,dormancy_dwell,18587,NtDelayExecution,,,, |
| S0006_0005,WOR00065,anti_debug_triggered,18,c2_communication,26677,recv,,,, |
| S0006_0005,WOR00065,sandbox_timing_check,24,sandbox_evasion_stall,49848,GetTickCount,,,, |
| S0006_0005,WOR00065,data_staged_for_exfil,26,persistence_establishment,37551,RegSetValueExW,,C:\ProgramData\sample_9684.dll,, |
| S0006_0005,WOR00065,data_staged_for_exfil,34,data_exfiltration,3741,send,,C:\ProgramData\sample_8081.dll,, |
| S0006_0005,WOR00065,persistence_registry_written,37,persistence_establishment,61694,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0006_0005,WOR00065,sandbox_timing_check,43,sandbox_evasion_stall,4080,GetTickCount,,,, |
| S0006_0005,WOR00065,self_delete_executed,52,self_destruct_cleanup,34273,DeleteFileW,,C:\Windows\Temp\sample_1107.bin,, |
| S0006_0006,DRO00066,av_signature_evaded,9,dormancy_dwell,21997,NtDelayExecution,,,, |
| S0006_0006,DRO00066,payload_keylogger_active,11,lateral_movement,31334,WMIExecMethod,,,, |
| S0006_0006,DRO00066,payload_cryptominer_spawned,30,payload_execution,40228,VirtualAllocEx,,,, |
| S0006_0006,DRO00066,c2_beacon_sent,48,c2_communication,59291,connect,,,legitimate_cloud,recently_registered |
| S0006_0006,DRO00066,dropper_executed,59,initial_drop,23993,WriteFile,,C:\Windows\Temp\sample_5341.ps1,, |
| S0006_0007,WOR00067,privilege_token_stolen,3,privilege_escalation,51928,AdjustTokenPrivileges,,,, |
| S0006_0007,WOR00067,sandbox_timing_check,4,sandbox_evasion_stall,30545,GetTickCount,,,, |
| S0006_0007,WOR00067,exfil_dns_tunnel,8,c2_communication,11138,connect,,,,legitimate_tld |
| S0006_0007,WOR00067,sandbox_timing_check,14,sandbox_evasion_stall,9032,IsDebuggerPresent,,,, |
| S0006_0007,WOR00067,sandbox_timing_check,19,sandbox_evasion_stall,35569,Sleep,,,, |
| S0006_0007,WOR00067,self_delete_executed,23,sandbox_evasion_stall,1901,IsDebuggerPresent,,/home/user/.config/sample_7248.bin,, |
| S0006_0007,WOR00067,exfil_https_c2,24,data_exfiltration,9074,send,,,private_rfc1918, |
| S0006_0007,WOR00067,privilege_token_stolen,28,privilege_escalation,23535,AdjustTokenPrivileges,,,, |
| S0006_0007,WOR00067,data_staged_for_exfil,42,data_exfiltration,25259,send,,/tmp/sample_4464.sh,, |
| S0006_0007,WOR00067,privilege_token_stolen,45,privilege_escalation,16979,BypassUAC,,,, |
| S0006_0007,WOR00067,data_staged_for_exfil,46,data_exfiltration,61484,send,,/home/user/.config/sample_1455.sh,, |
| S0006_0007,WOR00067,privilege_token_stolen,54,privilege_escalation,39189,ImpersonateLoggedOnUser,,,, |
| S0006_0008,RAN00068,exfil_https_c2,8,privilege_escalation,51557,OpenProcessToken,,,unknown_public, |
| S0006_0008,RAN00068,c2_beacon_sent,12,c2_communication,10748,recv,,,known_c2_infra,known_malicious |
| S0006_0008,RAN00068,sandbox_timing_check,17,data_exfiltration,24518,DnsQuery_W,,,, |
| S0006_0008,RAN00068,dropper_executed,24,initial_drop,50881,WriteFile,,C:\Users\Public\sample_6722.bat,, |
| S0006_0008,RAN00068,dropper_executed,31,initial_drop,38282,ShellExecuteW,,C:\Windows\Temp\sample_4509.exe,, |
| S0006_0008,RAN00068,lateral_smb_spread,39,lateral_movement,25528,WNetAddConnection2W,,,legitimate_cloud, |
| S0006_0008,RAN00068,privilege_token_stolen,48,privilege_escalation,39881,ImpersonateLoggedOnUser,,,, |
| S0006_0008,RAN00068,lateral_smb_spread,55,lateral_movement,51139,NetShareEnum,,,private_rfc1918, |
| S0006_0008,RAN00068,payload_ransomware_encrypt,57,payload_execution,17157,CreateThread,,,, |
| S0006_0009,SPY00069,data_staged_for_exfil,1,data_exfiltration,49575,DnsQuery_W,,C:\Users\Public\sample_1184.bin,, |
| S0006_0009,SPY00069,self_delete_executed,9,self_destruct_cleanup,46377,RemoveDirectoryW,,C:\Windows\Temp\sample_9650.ps1,, |
| S0006_0009,SPY00069,lateral_smb_spread,15,lateral_movement,58703,WMIExecMethod,,,private_rfc1918, |
| S0006_0009,SPY00069,av_signature_evaded,20,lateral_movement,52526,CreateRemoteThread,,,, |
| S0006_0009,SPY00069,c2_command_received,30,self_destruct_cleanup,49521,RegDeleteKeyW,,,unknown_public, |
| S0006_0009,SPY00069,c2_beacon_sent,35,c2_communication,39721,recv,,,legitimate_cloud,legitimate_tld |
| S0006_0009,SPY00069,persistence_registry_written,37,persistence_establishment,38664,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0006_0009,SPY00069,self_delete_executed,38,self_destruct_cleanup,53872,DeleteFileW,,/home/user/.config/sample_2348.bat,, |
| S0006_0009,SPY00069,av_signature_evaded,39,self_destruct_cleanup,43268,RegDeleteKeyW,,,, |
| S0006_0009,SPY00069,dropper_executed,54,initial_drop,42893,ShellExecuteW,,C:\ProgramData\sample_1290.sh,, |
| S0006_0009,SPY00069,data_staged_for_exfil,57,data_exfiltration,15140,DnsQuery_W,,/tmp/sample_3968.dll,, |
| S0006_0009,SPY00069,payload_ransomware_encrypt,58,payload_execution,39045,WriteProcessMemory,,,, |
| S0007_0000,BOT00070,lateral_wmi_exec,20,sandbox_evasion_stall,54469,IsDebuggerPresent,,,, |
| S0007_0000,BOT00070,self_delete_executed,22,self_destruct_cleanup,8881,DeleteFileW,,/home/user/.config/sample_3768.bat,, |
| S0007_0000,BOT00070,dll_sideloading_executed,27,data_exfiltration,21307,DnsQuery_W,,/tmp/sample_1753.bin,, |
| S0007_0000,BOT00070,sandbox_timing_check,30,sandbox_evasion_stall,56440,GetTickCount,,,, |
| S0007_0000,BOT00070,dropper_executed,32,initial_drop,11698,WriteFile,,C:\ProgramData\sample_4136.dll,, |
| S0007_0000,BOT00070,sandbox_vm_artefact_check,35,sandbox_evasion_stall,38218,IsDebuggerPresent,,,, |
| S0007_0000,BOT00070,av_signature_evaded,41,dormancy_dwell,16464,WaitForSingleObject,,,, |
| S0007_0000,BOT00070,sandbox_timing_check,49,sandbox_evasion_stall,61043,CheckRemoteDebuggerPresent,,,, |
| S0007_0000,BOT00070,lateral_smb_spread,56,lateral_movement,16965,WMIExecMethod,,,private_rfc1918, |
| S0007_0001,TRO00071,self_delete_executed,5,self_destruct_cleanup,9075,SHFileOperationW,,/home/user/.config/sample_1925.bat,, |
| S0007_0001,TRO00071,payload_ransomware_encrypt,13,payload_execution,32765,VirtualAllocEx,,,, |
| S0007_0001,TRO00071,c2_beacon_sent,14,c2_communication,53825,recv,,,unknown_public,legitimate_tld |
| S0007_0001,TRO00071,definitive_detection,24,self_destruct_cleanup,62421,RegDeleteKeyW,,,, |
| S0007_0001,TRO00071,dropper_executed,25,initial_drop,51343,WinExec,,C:\Users\Public\sample_1259.bin,, |
| S0007_0001,TRO00071,sandbox_timing_check,35,sandbox_evasion_stall,18106,Sleep,,,, |
| S0007_0001,TRO00071,exfil_dns_tunnel,38,lateral_movement,12035,CreateRemoteThread,,,,dga_generated |
| S0007_0001,TRO00071,lotl_binary_abused,39,c2_communication,60804,connect,,,, |
| S0007_0001,TRO00071,lateral_smb_spread,43,lateral_movement,56631,CreateRemoteThread,,,legitimate_cloud, |
| S0007_0001,TRO00071,payload_ransomware_encrypt,49,payload_execution,31997,CreateThread,,,, |
| S0007_0001,TRO00071,c2_command_received,50,sandbox_evasion_stall,4444,GetTickCount,,,known_c2_infra, |
| S0007_0001,TRO00071,dropper_executed,51,initial_drop,7518,WinExec,,/home/user/.config/sample_6562.ps1,, |
| S0007_0001,TRO00071,lateral_smb_spread,54,persistence_establishment,52935,StartupFolder,,,private_rfc1918, |
| S0007_0002,SPY00072,persistence_registry_written,0,persistence_establishment,40813,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0007_0002,SPY00072,lotl_binary_abused,10,initial_drop,21491,ShellExecuteW,,,, |
| S0007_0002,SPY00072,payload_ransomware_encrypt,13,payload_execution,63629,LoadLibraryA,,,, |
| S0007_0002,SPY00072,heuristic_alert_triggered,30,data_exfiltration,7213,send,,,, |
| S0007_0002,SPY00072,payload_ransomware_encrypt,32,payload_execution,50822,WriteProcessMemory,,,, |
| S0007_0002,SPY00072,sandbox_vm_artefact_check,35,data_exfiltration,48357,send,,,, |
| S0007_0002,SPY00072,av_signature_evaded,49,dormancy_dwell,49450,WaitForSingleObject,,,, |
| S0007_0002,SPY00072,dropper_executed,53,initial_drop,5993,WinExec,,/tmp/sample_3826.bat,, |
| S0007_0002,SPY00072,lateral_smb_spread,54,lateral_movement,21767,WNetAddConnection2W,,,legitimate_cloud, |
| S0007_0002,SPY00072,dropper_executed,55,initial_drop,54467,WriteFile,,/var/run/sample_3501.ps1,, |
| S0007_0003,TRO00073,dropper_executed,0,initial_drop,46482,CreateFileW,,/tmp/sample_1030.bat,, |
| S0007_0003,TRO00073,payload_cryptominer_spawned,15,lateral_movement,39178,WMIExecMethod,,,, |
| S0007_0003,TRO00073,lateral_smb_spread,19,lateral_movement,18298,CreateRemoteThread,,,known_c2_infra, |
| S0007_0003,TRO00073,self_delete_executed,21,self_destruct_cleanup,37561,DeleteFileW,,C:\ProgramData\sample_9512.bat,, |
| S0007_0003,TRO00073,payload_ransomware_encrypt,26,payload_execution,22812,LoadLibraryA,,,, |
| S0007_0003,TRO00073,lateral_smb_spread,36,initial_drop,54297,WinExec,,,legitimate_cloud, |
| S0007_0003,TRO00073,sandbox_vm_artefact_check,42,sandbox_evasion_stall,48108,GetTickCount,,,, |
| S0007_0003,TRO00073,persistence_registry_written,45,persistence_establishment,13308,SchtasksCreate,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0007_0004,CRY00074,data_staged_for_exfil,1,data_exfiltration,56557,HttpSendRequestW,,C:\Windows\Temp\sample_1735.dll,, |
| S0007_0004,CRY00074,av_signature_evaded,11,data_exfiltration,12899,InternetOpenW,,,, |
| S0007_0004,CRY00074,privilege_token_stolen,16,initial_drop,48797,WinExec,,,, |
| S0007_0004,CRY00074,persistence_registry_written,31,persistence_establishment,44769,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0007_0004,CRY00074,dropper_executed,32,initial_drop,11921,ShellExecuteW,,C:\Users\Public\sample_6384.bat,, |
| S0007_0004,CRY00074,lateral_smb_spread,39,lateral_movement,6716,CreateRemoteThread,,,cdn_provider, |
| S0007_0004,CRY00074,self_delete_executed,41,self_destruct_cleanup,64439,RegDeleteKeyW,,C:\ProgramData\sample_5446.exe,, |
| S0007_0004,CRY00074,heuristic_alert_triggered,47,initial_drop,65246,WriteFile,,,, |
| S0007_0004,CRY00074,sandbox_timing_check,54,sandbox_evasion_stall,38963,IsDebuggerPresent,,,, |
| S0007_0004,CRY00074,av_signature_evaded,56,dormancy_dwell,1106,SetTimer,,,, |
| S0007_0005,SPY00075,persistence_registry_written,4,persistence_establishment,10027,RegSetValueExW,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0007_0005,SPY00075,lateral_smb_spread,5,lateral_movement,41233,CreateRemoteThread,,,private_rfc1918, |
| S0007_0005,SPY00075,self_delete_executed,9,persistence_establishment,19508,CreateServiceW,,/home/user/.config/sample_4643.sh,, |
| S0007_0005,SPY00075,sandbox_timing_check,10,sandbox_evasion_stall,58178,Sleep,,,, |
| S0007_0005,SPY00075,sandbox_timing_check,17,sandbox_evasion_stall,49464,IsDebuggerPresent,,,, |
| S0007_0005,SPY00075,av_signature_evaded,18,dormancy_dwell,55036,NtDelayExecution,,,, |
| S0007_0005,SPY00075,av_signature_evaded,22,initial_drop,43430,ShellExecuteW,,,, |
| S0007_0005,SPY00075,dropper_executed,37,initial_drop,63518,ShellExecuteW,,/var/run/sample_2939.bin,, |
| S0007_0005,SPY00075,av_signature_evaded,40,dormancy_dwell,61481,WaitForSingleObject,,,, |
| S0007_0005,SPY00075,persistence_registry_written,41,persistence_establishment,50968,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0007_0005,SPY00075,av_signature_evaded,48,dormancy_dwell,63168,WaitForSingleObject,,,, |
| S0007_0005,SPY00075,payload_ransomware_encrypt,52,initial_drop,49436,ShellExecuteW,,,, |
| S0007_0005,SPY00075,c2_beacon_sent,57,c2_communication,3566,WSAConnect,,,cdn_provider,known_malicious |
| S0007_0006,WOR00076,privilege_token_stolen,0,privilege_escalation,45826,AdjustTokenPrivileges,,,, |
| S0007_0006,WOR00076,data_staged_for_exfil,7,data_exfiltration,42219,HttpSendRequestW,,/home/user/.config/sample_7081.dll,, |
| S0007_0006,WOR00076,heuristic_alert_triggered,20,privilege_escalation,33897,OpenProcessToken,,,, |
| S0007_0006,WOR00076,data_staged_for_exfil,31,data_exfiltration,13357,DnsQuery_W,,/home/user/.config/sample_5717.bat,, |
| S0007_0006,WOR00076,lateral_smb_spread,32,persistence_establishment,8317,StartupFolder,,,private_rfc1918, |
| S0007_0006,WOR00076,c2_beacon_sent,45,c2_communication,40894,WSAConnect,,,unknown_public,legitimate_tld |
| S0007_0006,WOR00076,privilege_token_stolen,55,privilege_escalation,6484,BypassUAC,,,, |
| S0007_0006,WOR00076,definitive_detection,58,payload_execution,50574,CreateThread,,,, |
| S0007_0007,ROO00077,sandbox_timing_check,5,sandbox_evasion_stall,65087,Sleep,,,, |
| S0007_0007,ROO00077,uac_bypass_attempted,10,persistence_establishment,28374,CreateServiceW,,,, |
| S0007_0007,ROO00077,sandbox_timing_check,23,sandbox_evasion_stall,46234,IsDebuggerPresent,,,, |
| S0007_0007,ROO00077,sandbox_timing_check,29,self_destruct_cleanup,9653,DeleteFileW,,,, |
| S0007_0007,ROO00077,lateral_smb_spread,31,lateral_movement,3117,WMIExecMethod,,,private_rfc1918, |
| S0007_0007,ROO00077,privilege_token_stolen,37,privilege_escalation,21911,BypassUAC,,,, |
| S0007_0007,ROO00077,privilege_token_stolen,39,privilege_escalation,49350,OpenProcessToken,,,, |
| S0007_0007,ROO00077,self_delete_executed,41,self_destruct_cleanup,16899,SHFileOperationW,,/home/user/.config/sample_9830.bin,, |
| S0007_0007,ROO00077,sandbox_timing_check,42,sandbox_evasion_stall,15425,Sleep,,,, |
| S0007_0007,ROO00077,payload_ransomware_encrypt,44,payload_execution,20593,CreateThread,,,, |
| S0007_0007,ROO00077,data_staged_for_exfil,47,data_exfiltration,64141,HttpSendRequestW,,C:\Users\Public\sample_6474.dll,, |
| S0007_0007,ROO00077,av_signature_evaded,51,dormancy_dwell,55832,NtDelayExecution,,,, |
| S0007_0007,ROO00077,dropper_executed,54,privilege_escalation,24238,AdjustTokenPrivileges,,/tmp/sample_1985.bin,, |
| S0007_0007,ROO00077,heuristic_alert_triggered,55,payload_execution,29140,CreateThread,,,, |
| S0007_0007,ROO00077,lateral_smb_spread,56,lateral_movement,56005,NetShareEnum,,,legitimate_cloud, |
| S0007_0007,ROO00077,sandbox_timing_check,59,initial_drop,38319,WriteFile,,,, |
| S0007_0008,FIL00078,payload_ransomware_encrypt,3,payload_execution,10495,LoadLibraryA,,,, |
| S0007_0008,FIL00078,data_staged_for_exfil,5,data_exfiltration,29679,DnsQuery_W,,C:\Users\Public\sample_1461.ps1,, |
| S0007_0008,FIL00078,lotl_binary_abused,11,sandbox_evasion_stall,39141,GetTickCount,,,, |
| S0007_0008,FIL00078,lateral_smb_spread,12,privilege_escalation,46150,AdjustTokenPrivileges,,,legitimate_cloud, |
| S0007_0008,FIL00078,c2_beacon_sent,14,c2_communication,1378,connect,,,cdn_provider,legitimate_tld |
| S0007_0008,FIL00078,payload_keylogger_active,17,privilege_escalation,19434,OpenProcessToken,,,, |
| S0007_0008,FIL00078,c2_beacon_sent,22,c2_communication,4542,InternetReadFile,,,unknown_public,subdomain_c2 |
| S0007_0008,FIL00078,dropper_executed,31,initial_drop,55437,CreateFileW,,/var/run/sample_3658.exe,, |
| S0007_0008,FIL00078,payload_ransomware_encrypt,41,payload_execution,15057,LoadLibraryA,,,, |
| S0007_0008,FIL00078,c2_beacon_sent,47,c2_communication,26583,WSAConnect,,,legitimate_cloud,legitimate_tld |
| S0007_0008,FIL00078,dll_sideloading_executed,51,data_exfiltration,51950,HttpSendRequestW,,C:\Windows\Temp\sample_3323.sh,, |
| S0007_0009,CRY00079,c2_beacon_sent,10,c2_communication,34200,recv,,,legitimate_cloud,dga_generated |
| S0007_0009,CRY00079,c2_beacon_sent,18,c2_communication,27752,WSAConnect,,,cdn_provider,legitimate_tld |
| S0007_0009,CRY00079,lateral_smb_spread,21,lateral_movement,27315,WNetAddConnection2W,,,legitimate_cloud, |
| S0007_0009,CRY00079,data_staged_for_exfil,24,initial_drop,7722,WriteFile,,/var/run/sample_8735.dll,, |
| S0007_0009,CRY00079,privilege_token_stolen,25,privilege_escalation,26081,BypassUAC,,,, |
| S0007_0009,CRY00079,av_signature_evaded,26,self_destruct_cleanup,13515,SHFileOperationW,,,, |
| S0007_0009,CRY00079,self_delete_executed,28,self_destruct_cleanup,27242,RegDeleteKeyW,,/home/user/.config/sample_4111.bat,, |
| S0007_0009,CRY00079,av_signature_evaded,58,c2_communication,17451,connect,,,, |
| S0008_0000,DRO00080,lotl_binary_abused,11,dormancy_dwell,53766,WaitForSingleObject,,,, |
| S0008_0000,DRO00080,sandbox_timing_check,24,sandbox_evasion_stall,36115,GetTickCount,,,, |
| S0008_0000,DRO00080,lateral_smb_spread,27,lateral_movement,60675,WNetAddConnection2W,,,cdn_provider, |
| S0008_0000,DRO00080,sandbox_timing_check,30,sandbox_evasion_stall,21553,GetTickCount,,,, |
| S0008_0000,DRO00080,data_staged_for_exfil,43,data_exfiltration,59499,DnsQuery_W,,C:\ProgramData\sample_5776.sh,, |
| S0008_0000,DRO00080,payload_ransomware_encrypt,53,payload_execution,23217,WriteProcessMemory,,,, |
| S0008_0001,SPY00081,payload_keylogger_active,23,persistence_establishment,47584,CreateServiceW,,,, |
| S0008_0001,SPY00081,exfil_https_c2,31,initial_drop,53031,ShellExecuteW,,,private_rfc1918, |
| S0008_0001,SPY00081,dll_sideloading_executed,32,persistence_establishment,7885,StartupFolder,,C:\Users\Public\sample_7244.sh,, |
| S0008_0001,SPY00081,persistence_registry_written,47,persistence_establishment,58449,StartupFolder,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0008_0001,SPY00081,payload_ransomware_encrypt,55,payload_execution,5026,LoadLibraryA,,,, |
| S0008_0002,TRO00082,lateral_smb_spread,0,lateral_movement,29382,NetShareEnum,,,known_c2_infra, |
| S0008_0002,TRO00082,c2_beacon_sent,7,c2_communication,23706,WSAConnect,,,cdn_provider,legitimate_tld |
| S0008_0002,TRO00082,c2_beacon_sent,20,c2_communication,48683,connect,,,cdn_provider,recently_registered |
| S0008_0002,TRO00082,self_delete_executed,24,self_destruct_cleanup,34880,RemoveDirectoryW,,/var/run/sample_6873.exe,, |
| S0008_0002,TRO00082,privilege_token_stolen,26,privilege_escalation,32777,BypassUAC,,,, |
| S0008_0002,TRO00082,payload_ransomware_encrypt,27,payload_execution,56636,CreateThread,,,, |
| S0008_0002,TRO00082,privilege_token_stolen,28,privilege_escalation,62717,ImpersonateLoggedOnUser,,,, |
| S0008_0002,TRO00082,lateral_smb_spread,32,lateral_movement,59044,WNetAddConnection2W,,,private_rfc1918, |
| S0008_0002,TRO00082,payload_ransomware_encrypt,37,payload_execution,46576,WriteProcessMemory,,,, |
| S0008_0002,TRO00082,sandbox_timing_check,38,sandbox_evasion_stall,48957,Sleep,,,, |
| S0008_0002,TRO00082,lotl_binary_abused,48,dormancy_dwell,48318,SetTimer,,,, |
| S0008_0002,TRO00082,payload_ransomware_encrypt,49,payload_execution,60547,CreateThread,,,, |
| S0008_0002,TRO00082,sandbox_timing_check,50,sandbox_evasion_stall,43558,GetTickCount,,,, |
| S0008_0002,TRO00082,lateral_smb_spread,52,lateral_movement,24875,CreateRemoteThread,,,known_c2_infra, |
| S0008_0002,TRO00082,lotl_binary_abused,56,sandbox_evasion_stall,29394,GetTickCount,,,, |
| S0008_0002,TRO00082,self_delete_executed,57,self_destruct_cleanup,15889,DeleteFileW,,/tmp/sample_1794.ps1,, |
| S0008_0003,APT00083,lateral_smb_spread,3,lateral_movement,12485,WMIExecMethod,,,legitimate_cloud, |
| S0008_0003,APT00083,process_hollowing_executed,6,c2_communication,54968,recv,,,, |
| S0008_0003,APT00083,process_hollowing_executed,14,privilege_escalation,57796,OpenProcessToken,,,, |
| S0008_0003,APT00083,lateral_smb_spread,17,lateral_movement,10396,WMIExecMethod,,,legitimate_cloud, |
| S0008_0003,APT00083,persistence_registry_written,26,persistence_establishment,45305,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0008_0003,APT00083,persistence_registry_written,27,persistence_establishment,1766,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0008_0003,APT00083,data_staged_for_exfil,32,data_exfiltration,3685,send,,C:\Windows\Temp\sample_6950.ps1,, |
| S0008_0003,APT00083,privilege_token_stolen,42,payload_execution,33426,VirtualAllocEx,,,, |
| S0008_0003,APT00083,payload_ransomware_encrypt,46,payload_execution,64797,WriteProcessMemory,,,, |
| S0008_0003,APT00083,persistence_registry_written,48,persistence_establishment,45608,RegSetValueExW,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0008_0003,APT00083,sandbox_timing_check,49,sandbox_evasion_stall,16279,IsDebuggerPresent,,,, |
| S0008_0003,APT00083,persistence_scheduled_task,50,sandbox_evasion_stall,64179,CheckRemoteDebuggerPresent,,,, |
| S0008_0003,APT00083,self_delete_executed,57,c2_communication,9501,InternetReadFile,,/tmp/sample_3586.bin,, |
| S0008_0004,CRY00084,av_signature_evaded,0,privilege_escalation,11365,OpenProcessToken,,,, |
| S0008_0004,CRY00084,payload_ransomware_encrypt,6,payload_execution,60789,WriteProcessMemory,,,, |
| S0008_0004,CRY00084,av_signature_evaded,15,dormancy_dwell,3473,NtDelayExecution,,,, |
| S0008_0004,CRY00084,c2_beacon_sent,17,c2_communication,40659,WSAConnect,,,cdn_provider,legitimate_tld |
| S0008_0004,CRY00084,privilege_token_stolen,35,privilege_escalation,36272,OpenProcessToken,,,, |
| S0008_0004,CRY00084,self_delete_executed,36,self_destruct_cleanup,36052,DeleteFileW,,C:\Windows\Temp\sample_8716.sh,, |
| S0008_0004,CRY00084,dropper_executed,45,c2_communication,61918,WSAConnect,,/home/user/.config/sample_3779.sh,, |
| S0008_0004,CRY00084,data_staged_for_exfil,49,data_exfiltration,17461,InternetOpenW,,/tmp/sample_1267.dll,, |
| S0008_0004,CRY00084,payload_ransomware_encrypt,54,data_exfiltration,43792,InternetOpenW,,,, |
| S0008_0004,CRY00084,lotl_binary_abused,56,dormancy_dwell,29512,NtDelayExecution,,,, |
| S0008_0005,BOT00085,self_delete_executed,0,self_destruct_cleanup,51578,DeleteFileW,,/var/run/sample_1326.exe,, |
| S0008_0005,BOT00085,persistence_registry_written,14,persistence_establishment,5939,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0008_0005,BOT00085,av_signature_evaded,16,dormancy_dwell,58639,SetTimer,,,, |
| S0008_0005,BOT00085,dropper_executed,25,initial_drop,45423,ShellExecuteW,,/tmp/sample_4168.dll,, |
| S0008_0005,BOT00085,av_signature_evaded,28,dormancy_dwell,34044,NtDelayExecution,,,, |
| S0008_0005,BOT00085,privilege_token_stolen,42,privilege_escalation,48438,BypassUAC,,,, |
| S0008_0005,BOT00085,privilege_token_stolen,43,privilege_escalation,12616,AdjustTokenPrivileges,,,, |
| S0008_0005,BOT00085,heuristic_alert_triggered,55,payload_execution,32304,CreateThread,,,, |
| S0008_0006,RAN00086,payload_cryptominer_spawned,10,lateral_movement,16682,NetShareEnum,,,, |
| S0008_0006,RAN00086,av_signature_evaded,28,dormancy_dwell,58512,SetTimer,,,, |
| S0008_0006,RAN00086,privilege_token_stolen,43,privilege_escalation,53172,OpenProcessToken,,,, |
| S0008_0006,RAN00086,dropper_executed,49,sandbox_evasion_stall,57801,IsDebuggerPresent,,/home/user/.config/sample_7398.ps1,, |
| S0008_0007,WOR00087,lotl_binary_abused,0,payload_execution,19806,CreateThread,,,, |
| S0008_0007,WOR00087,data_staged_for_exfil,4,data_exfiltration,39039,DnsQuery_W,,/tmp/sample_4508.ps1,, |
| S0008_0007,WOR00087,payload_keylogger_active,11,persistence_establishment,62968,CreateServiceW,,,, |
| S0008_0007,WOR00087,c2_command_received,12,lateral_movement,35464,NetShareEnum,,,unknown_public, |
| S0008_0007,WOR00087,privilege_token_stolen,19,privilege_escalation,65384,ImpersonateLoggedOnUser,,,, |
| S0008_0007,WOR00087,dropper_executed,24,privilege_escalation,21307,ImpersonateLoggedOnUser,,/tmp/sample_6141.exe,, |
| S0008_0007,WOR00087,payload_ransomware_encrypt,25,payload_execution,39749,VirtualAllocEx,,,, |
| S0008_0007,WOR00087,data_staged_for_exfil,43,data_exfiltration,3731,HttpSendRequestW,,/tmp/sample_8807.ps1,, |
| S0008_0007,WOR00087,c2_beacon_sent,44,c2_communication,18559,connect,,,legitimate_cloud,recently_registered |
| S0008_0007,WOR00087,av_signature_evaded,49,dormancy_dwell,57583,GetSystemTime,,,, |
| S0008_0008,BOT00088,sandbox_timing_check,2,sandbox_evasion_stall,20090,CheckRemoteDebuggerPresent,,,, |
| S0008_0008,BOT00088,sandbox_timing_check,3,sandbox_evasion_stall,33887,CheckRemoteDebuggerPresent,,,, |
| S0008_0008,BOT00088,lateral_smb_spread,7,lateral_movement,62505,NetShareEnum,,,legitimate_cloud, |
| S0008_0008,BOT00088,dropper_executed,10,dormancy_dwell,19525,SetTimer,,/var/run/sample_8201.sh,, |
| S0008_0008,BOT00088,process_hollowing_executed,17,persistence_establishment,29581,SchtasksCreate,,,, |
| S0008_0008,BOT00088,lateral_smb_spread,20,lateral_movement,3714,NetShareEnum,,,unknown_public, |
| S0008_0008,BOT00088,privilege_token_stolen,33,privilege_escalation,63427,AdjustTokenPrivileges,,,, |
| S0008_0008,BOT00088,c2_beacon_sent,35,c2_communication,53289,InternetReadFile,,,known_c2_infra,dga_generated |
| S0008_0008,BOT00088,sandbox_timing_check,38,sandbox_evasion_stall,30814,GetTickCount,,,, |
| S0008_0008,BOT00088,av_signature_evaded,42,dormancy_dwell,42229,SetTimer,,,, |
| S0008_0008,BOT00088,sandbox_timing_check,44,sandbox_evasion_stall,21467,GetTickCount,,,, |
| S0008_0008,BOT00088,persistence_registry_written,49,persistence_establishment,48796,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0008_0008,BOT00088,lateral_smb_spread,53,lateral_movement,4034,WNetAddConnection2W,,,cdn_provider, |
| S0008_0008,BOT00088,exfil_dns_tunnel,56,privilege_escalation,17153,ImpersonateLoggedOnUser,,,,recently_registered |
| S0008_0008,BOT00088,sandbox_timing_check,57,sandbox_evasion_stall,24258,GetTickCount,,,, |
| S0008_0009,APT00089,c2_beacon_sent,4,c2_communication,5438,InternetReadFile,,,private_rfc1918,legitimate_tld |
| S0008_0009,APT00089,c2_command_received,8,sandbox_evasion_stall,58581,GetTickCount,,,cdn_provider, |
| S0008_0009,APT00089,definitive_detection,13,dormancy_dwell,4081,SetTimer,,,, |
| S0008_0009,APT00089,persistence_registry_written,16,persistence_establishment,3815,SchtasksCreate,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0008_0009,APT00089,exfil_dns_tunnel,19,payload_execution,38325,WriteProcessMemory,,,,known_malicious |
| S0008_0009,APT00089,uac_bypass_attempted,21,lateral_movement,58156,CreateRemoteThread,,,, |
| S0008_0009,APT00089,data_staged_for_exfil,26,data_exfiltration,28111,DnsQuery_W,,C:\ProgramData\sample_4101.sh,, |
| S0008_0009,APT00089,privilege_token_stolen,34,privilege_escalation,52789,BypassUAC,,,, |
| S0008_0009,APT00089,dropper_executed,35,initial_drop,5307,WriteFile,,/home/user/.config/sample_5536.ps1,, |
| S0008_0009,APT00089,privilege_token_stolen,40,privilege_escalation,48669,OpenProcessToken,,,, |
| S0008_0009,APT00089,self_delete_executed,42,self_destruct_cleanup,3595,RegDeleteKeyW,,C:\Users\Public\sample_9792.bat,, |
| S0008_0009,APT00089,av_signature_evaded,50,dormancy_dwell,12681,NtDelayExecution,,,, |
| S0008_0009,APT00089,payload_ransomware_encrypt,54,payload_execution,63432,VirtualAllocEx,,,, |
| S0008_0009,APT00089,exfil_dns_tunnel,56,c2_communication,5802,WSAConnect,,,,known_malicious |
| S0009_0000,SPY00090,payload_ransomware_encrypt,1,payload_execution,26654,WriteProcessMemory,,,, |
| S0009_0000,SPY00090,lateral_wmi_exec,4,data_exfiltration,54289,send,,,, |
| S0009_0000,SPY00090,sandbox_timing_check,32,sandbox_evasion_stall,57267,Sleep,,,, |
| S0009_0000,SPY00090,c2_beacon_sent,39,c2_communication,19121,InternetReadFile,,,cdn_provider,dga_generated |
| S0009_0000,SPY00090,lateral_smb_spread,45,lateral_movement,28362,NetShareEnum,,,cdn_provider, |
| S0009_0001,APT00091,payload_ransomware_encrypt,0,payload_execution,29464,WriteProcessMemory,,,, |
| S0009_0001,APT00091,sandbox_timing_check,2,sandbox_evasion_stall,23258,GetTickCount,,,, |
| S0009_0001,APT00091,sandbox_timing_check,3,sandbox_evasion_stall,6496,IsDebuggerPresent,,,, |
| S0009_0001,APT00091,persistence_registry_written,6,sandbox_evasion_stall,35988,IsDebuggerPresent,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,9,payload_execution,38512,CreateThread,,,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,24,payload_execution,54577,CreateThread,,,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,32,payload_execution,15565,VirtualAllocEx,,,, |
| S0009_0001,APT00091,anti_debug_triggered,33,initial_drop,31972,WinExec,,,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,36,payload_execution,50573,CreateThread,,,, |
| S0009_0001,APT00091,persistence_registry_written,37,persistence_establishment,64499,SchtasksCreate,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,43,payload_execution,42188,WriteProcessMemory,,,, |
| S0009_0001,APT00091,dropper_executed,50,initial_drop,3570,WriteFile,,/var/run/sample_7853.bat,, |
| S0009_0001,APT00091,payload_ransomware_encrypt,52,payload_execution,61400,LoadLibraryA,,,, |
| S0009_0001,APT00091,c2_beacon_sent,53,c2_communication,18982,WSAConnect,,,cdn_provider,subdomain_c2 |
| S0009_0001,APT00091,persistence_registry_written,55,persistence_establishment,32109,StartupFolder,HKLM\SYSTEM\CurrentControlSet\Services,,, |
| S0009_0002,APT00092,self_delete_executed,8,self_destruct_cleanup,21381,RemoveDirectoryW,,C:\Windows\Temp\sample_7871.bin,, |
| S0009_0002,APT00092,av_signature_evaded,11,dormancy_dwell,4751,NtDelayExecution,,,, |
| S0009_0002,APT00092,c2_beacon_sent,34,c2_communication,28332,WSAConnect,,,unknown_public,known_malicious |
| S0009_0002,APT00092,privilege_token_stolen,36,privilege_escalation,15991,ImpersonateLoggedOnUser,,,, |
| S0009_0002,APT00092,data_staged_for_exfil,39,persistence_establishment,43638,CreateServiceW,,/tmp/sample_1014.bin,, |
| S0009_0002,APT00092,persistence_registry_written,51,persistence_establishment,31035,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0009_0002,APT00092,dropper_executed,56,initial_drop,46230,ShellExecuteW,,C:\Users\Public\sample_1658.exe,, |
| S0009_0003,WOR00093,persistence_registry_written,3,persistence_establishment,45894,StartupFolder,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0009_0003,WOR00093,payload_cryptominer_spawned,4,privilege_escalation,2070,BypassUAC,,,, |
| S0009_0003,WOR00093,payload_ransomware_encrypt,11,payload_execution,55138,VirtualAllocEx,,,, |
| S0009_0003,WOR00093,lateral_smb_spread,14,lateral_movement,44105,CreateRemoteThread,,,cdn_provider, |
| S0009_0003,WOR00093,payload_ransomware_encrypt,17,payload_execution,30280,LoadLibraryA,,,, |
| S0009_0003,WOR00093,lateral_smb_spread,20,lateral_movement,27230,NetShareEnum,,,private_rfc1918, |
| S0009_0003,WOR00093,dropper_executed,27,initial_drop,15668,WinExec,,C:\ProgramData\sample_6048.ps1,, |
| S0009_0003,WOR00093,lateral_smb_spread,35,lateral_movement,38824,CreateRemoteThread,,,known_c2_infra, |
| S0009_0003,WOR00093,dropper_executed,39,data_exfiltration,64549,send,,/var/run/sample_2783.bin,, |
| S0009_0003,WOR00093,payload_ransomware_encrypt,40,payload_execution,49122,WriteProcessMemory,,,, |
| S0009_0003,WOR00093,sandbox_timing_check,47,sandbox_evasion_stall,15545,CheckRemoteDebuggerPresent,,,, |
| S0009_0003,WOR00093,dropper_executed,53,initial_drop,32825,ShellExecuteW,,C:\ProgramData\sample_2760.exe,, |
| S0009_0003,WOR00093,privilege_token_stolen,56,privilege_escalation,11485,AdjustTokenPrivileges,,,, |
| S0009_0003,WOR00093,payload_ransomware_encrypt,58,payload_execution,19090,LoadLibraryA,,,, |
| S0009_0004,APT00094,persistence_registry_written,5,persistence_establishment,2725,RegSetValueExW,HKCU\SOFTWARE\Classes\exefile\shell\open\command,,, |
| S0009_0004,APT00094,sandbox_timing_check,19,lateral_movement,54243,CreateRemoteThread,,,, |
| S0009_0004,APT00094,sandbox_timing_check,21,sandbox_evasion_stall,5368,GetTickCount,,,, |
| S0009_0004,APT00094,data_staged_for_exfil,24,c2_communication,5396,connect,,/tmp/sample_5954.bat,, |
| S0009_0004,APT00094,sandbox_timing_check,34,sandbox_evasion_stall,13185,IsDebuggerPresent,,,, |
| S0009_0004,APT00094,dropper_executed,36,initial_drop,63213,WriteFile,,/var/run/sample_4817.dll,, |
| S0009_0004,APT00094,privilege_token_stolen,40,privilege_escalation,50788,ImpersonateLoggedOnUser,,,, |
| S0009_0004,APT00094,heuristic_alert_triggered,49,sandbox_evasion_stall,31144,GetTickCount,,,, |
| S0009_0004,APT00094,dropper_executed,50,initial_drop,60540,ShellExecuteW,,C:\ProgramData\sample_1075.sh,, |
| S0009_0004,APT00094,dropper_executed,52,initial_drop,38541,CreateFileW,,C:\Windows\Temp\sample_3346.bin,, |
| S0009_0004,APT00094,uac_bypass_attempted,54,payload_execution,35558,LoadLibraryA,,,, |
| S0009_0004,APT00094,c2_beacon_sent,55,data_exfiltration,13358,send,,,known_c2_infra,legitimate_tld |
| S0009_0004,APT00094,payload_ransomware_encrypt,59,payload_execution,61749,CreateThread,,,, |
| S0009_0005,ROO00095,privilege_token_stolen,0,privilege_escalation,1174,AdjustTokenPrivileges,,,, |
| S0009_0005,ROO00095,self_delete_executed,2,privilege_escalation,25247,AdjustTokenPrivileges,,/home/user/.config/sample_6043.sh,, |
| S0009_0005,ROO00095,payload_keylogger_active,8,self_destruct_cleanup,18193,SHFileOperationW,,,, |
| S0009_0005,ROO00095,data_staged_for_exfil,11,data_exfiltration,8938,InternetOpenW,,/home/user/.config/sample_1487.dll,, |
| S0009_0005,ROO00095,lateral_smb_spread,13,lateral_movement,15305,NetShareEnum,,,cdn_provider, |
| S0009_0005,ROO00095,c2_beacon_sent,15,c2_communication,2867,InternetReadFile,,,private_rfc1918,subdomain_c2 |
| S0009_0005,ROO00095,sandbox_timing_check,23,privilege_escalation,28828,AdjustTokenPrivileges,,,, |
| S0009_0005,ROO00095,lateral_smb_spread,25,lateral_movement,5918,NetShareEnum,,,private_rfc1918, |
| S0009_0005,ROO00095,dropper_executed,37,initial_drop,10262,WinExec,,/home/user/.config/sample_8280.bin,, |
| S0009_0005,ROO00095,persistence_registry_written,47,persistence_establishment,41630,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0009_0005,ROO00095,payload_ransomware_encrypt,53,payload_execution,54602,WriteProcessMemory,,,, |
| S0009_0005,ROO00095,payload_ransomware_encrypt,54,payload_execution,1637,LoadLibraryA,,,, |
| S0009_0005,ROO00095,av_signature_evaded,56,dormancy_dwell,11283,WaitForSingleObject,,,, |
| S0009_0005,ROO00095,c2_beacon_sent,59,c2_communication,41370,WSAConnect,,,private_rfc1918,subdomain_c2 |
| S0009_0006,ROO00096,payload_ransomware_encrypt,0,payload_execution,2246,WriteProcessMemory,,,, |
| S0009_0006,ROO00096,self_delete_executed,1,self_destruct_cleanup,38323,RegDeleteKeyW,,/home/user/.config/sample_6761.sh,, |
| S0009_0006,ROO00096,data_staged_for_exfil,2,data_exfiltration,59120,HttpSendRequestW,,/home/user/.config/sample_4352.exe,, |
| S0009_0006,ROO00096,sandbox_timing_check,11,sandbox_evasion_stall,47644,GetTickCount,,,, |
| S0009_0006,ROO00096,c2_beacon_sent,23,c2_communication,62393,recv,,,cdn_provider,dga_generated |
| S0009_0006,ROO00096,c2_beacon_sent,26,c2_communication,30294,WSAConnect,,,legitimate_cloud,legitimate_tld |
| S0009_0006,ROO00096,self_delete_executed,29,self_destruct_cleanup,55119,RemoveDirectoryW,,C:\Users\Public\sample_2539.sh,, |
| S0009_0006,ROO00096,data_staged_for_exfil,30,self_destruct_cleanup,62089,DeleteFileW,,/home/user/.config/sample_8761.ps1,, |
| S0009_0006,ROO00096,privilege_token_stolen,31,privilege_escalation,18452,AdjustTokenPrivileges,,,, |
| S0009_0006,ROO00096,heuristic_alert_triggered,33,data_exfiltration,48403,InternetOpenW,,,, |
| S0009_0006,ROO00096,av_signature_evaded,43,dormancy_dwell,21435,SetTimer,,,, |
| S0009_0006,ROO00096,dropper_executed,45,initial_drop,10313,WinExec,,/home/user/.config/sample_1837.dll,, |
| S0009_0006,ROO00096,exfil_dns_tunnel,53,persistence_establishment,26282,CreateServiceW,,,,known_malicious |
| S0009_0007,CRY00097,sandbox_timing_check,6,sandbox_evasion_stall,27408,CheckRemoteDebuggerPresent,,,, |
| S0009_0007,CRY00097,dropper_executed,12,initial_drop,44165,WinExec,,/var/run/sample_9049.exe,, |
| S0009_0007,CRY00097,sandbox_timing_check,13,sandbox_evasion_stall,54166,CheckRemoteDebuggerPresent,,,, |
| S0009_0007,CRY00097,sandbox_timing_check,22,sandbox_evasion_stall,43280,IsDebuggerPresent,,,, |
| S0009_0007,CRY00097,sandbox_vm_artefact_check,23,dormancy_dwell,3933,WaitForSingleObject,,,, |
| S0009_0007,CRY00097,self_delete_executed,40,self_destruct_cleanup,7958,DeleteFileW,,/tmp/sample_5282.bat,, |
| S0009_0007,CRY00097,lotl_binary_abused,41,payload_execution,2376,CreateThread,,,, |
| S0009_0007,CRY00097,sandbox_timing_check,46,sandbox_evasion_stall,9221,GetTickCount,,,, |
| S0009_0007,CRY00097,self_delete_executed,47,self_destruct_cleanup,54616,DeleteFileW,,/var/run/sample_1239.sh,, |
| S0009_0007,CRY00097,process_hollowing_executed,53,c2_communication,47780,recv,,,, |
| S0009_0007,CRY00097,exfil_https_c2,59,data_exfiltration,60099,InternetOpenW,,,cdn_provider, |
| S0009_0008,CRY00098,persistence_registry_written,2,persistence_establishment,63908,RegSetValueExW,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,,, |
| S0009_0008,CRY00098,c2_command_received,15,sandbox_evasion_stall,47767,CheckRemoteDebuggerPresent,,,known_c2_infra, |
| S0009_0008,CRY00098,persistence_registry_written,18,persistence_establishment,38809,CreateServiceW,HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0009_0008,CRY00098,data_staged_for_exfil,20,data_exfiltration,13653,InternetOpenW,,/tmp/sample_4172.sh,, |
| S0009_0008,CRY00098,payload_cryptominer_spawned,24,sandbox_evasion_stall,26534,CheckRemoteDebuggerPresent,,,, |
| S0009_0008,CRY00098,persistence_registry_written,36,persistence_establishment,23973,StartupFolder,HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,,, |
| S0009_0008,CRY00098,sandbox_timing_check,40,payload_execution,61300,VirtualAllocEx,,,, |
| S0009_0008,CRY00098,c2_beacon_sent,43,c2_communication,16955,WSAConnect,,,unknown_public,recently_registered |
| S0009_0008,CRY00098,payload_cryptominer_spawned,48,self_destruct_cleanup,49775,RegDeleteKeyW,,,, |
| S0009_0008,CRY00098,av_signature_evaded,52,dormancy_dwell,10850,GetSystemTime,,,, |
| S0009_0008,CRY00098,dll_sideloading_executed,58,self_destruct_cleanup,32020,RegDeleteKeyW,,C:\Windows\Temp\sample_8293.exe,, |
| S0009_0009,TRO00099,lateral_smb_spread,10,lateral_movement,35827,WMIExecMethod,,,known_c2_infra, |
| S0009_0009,TRO00099,self_delete_executed,14,self_destruct_cleanup,13028,RegDeleteKeyW,,/var/run/sample_9880.sh,, |
| S0009_0009,TRO00099,c2_beacon_sent,21,c2_communication,61627,recv,,,tor_exit_node,legitimate_tld |
| S0009_0009,TRO00099,sandbox_timing_check,30,sandbox_evasion_stall,8804,CheckRemoteDebuggerPresent,,,, |
| S0009_0009,TRO00099,lateral_wmi_exec,40,data_exfiltration,16072,DnsQuery_W,,,, |
| S0009_0009,TRO00099,sandbox_timing_check,47,sandbox_evasion_stall,56837,IsDebuggerPresent,,,, |
| S0009_0009,TRO00099,sandbox_timing_check,57,sandbox_evasion_stall,23931,GetTickCount,,,, |
|
|