Skip to content

Commit

Permalink
Added Data
Browse files Browse the repository at this point in the history
  • Loading branch information
Sander committed Jun 7, 2020
1 parent 0caee97 commit f1241e0
Show file tree
Hide file tree
Showing 83 changed files with 58,575 additions and 0 deletions.
40 changes: 40 additions & 0 deletions Malware_Samples_Overview.csv
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
Sample_ID,Category,Sample_Name,Source_Name,First_Submission,Sample_Type,Virustotal,Result_NIDS,Result_HIDS_3,Result_HIDS_1,Result_HIDS_2,Sample_MD5,Sample_SHA256
1,Cryptominer,Generic.Application.CoinMiner,DAS MALWERK,2018-08-28,"Win32 EXE
",61/71,1,1,0,0,c22908fe460312d76b50129aa3ef2cf2,46f79c451e652fc4ce7ad5a6f9eb737642077c128e514c889458220ed6985913
2,Backdoor,Win32:Malware-gen,VirusBay,2020-03-26,"Win32 EXE
",35/73,0,1,0,0,e6a132e279806cc95684dc2bd67a0da0,ba07e07a2c279246901b613a26ed95dc37bce9e0aa1ba17d5e812a8e84bda164
3,Backdoor,Trojan-Banker.Agent,VirusBay,2019-12-03,"Win32 EXE
",37/68,1,0,0,0,aa52c9a86073b75748ec6c98eca17dab,09ab5a3c9583ed5cf63fc2e4641c7774edfd84127af69faacde4628881cbe157
4,Backdoor,Trojan.DCRAT,ANY RUN,2020-05-13,Win32 EXE,48/72,0,1,,,1e2611836860d60a2a6b4c560ef74650,e67ac2ffa5e650be9139de22f0e543f1e3c84823e86abd80135d6117b2bc8060
5,Backdoor,Trojan.Qbot,ANY RUN,2020-05-28,VBS,-,1,1,,,1c347009d6fce779bca8385395f26f94,2e57d9a80d45e2d78453c91829873260cdce4ac5f2cada73421a4a1faadbd445
6,Backdoor,Trojan.Agent.Zenpak,VirusBay,2019-04-24,"Win32 EXE
",58/72,0,0,,,fbe6d341c1b69975be74616d01c6d273,ec6097c4fdbe0736e416b58be0a4dd042c46a9cf7eef997b3eb72384609cbca9
7,Backdoor,Shadowhammer,VirusBay,2019-3-27,application/x-rar,2/55,0,0,,,c09e41b3eb42eb79853de5bd1f5a5830,03466caff060a816688eb35f10b9bf3b8d44c364fde620cbb4e2c0c23309df79
8,Backdoor,Backdoor.AsyncRAT,Virus Share,2019-08-12,"Win32 EXE
",54/73,0,1,,,9f16a651f918972eee7be4f19d40bb91,041a4f5c60d5186913c46f9e0b246354f0944b03eb7d61325a60ae338faebbc8
9,Backdoor,"Backdoor.Bladabindi
",Virus Share,2019-08-26,Win32 EXE,66/72,0,1,0,0,c2c057d9645af7f64e9d11672840828e,a2dc89b1aa5e3b6ff023b87a45756f50c667d94e44fff760ddea39a2c07a100d
10,Spyware,TrojanSpy.Win32,Virus Share,2019-02-18 ,Win32 EXE,60/69,-,-,,,19b11aa448409adc15c93e1fdd3c6774,2016ce2662c71ee8d4e63d5282ffe0c860ba95d3e8cff98462a9fdbef5211f9a
11,Spyware,Trojan.Spyware,VirusBay,2019-10-14,Win32 EXE,61/71,1,0,,,40c0304b144736668ca2a0217d296c37,e24e4cf5454cbc5026f1a47d083ab22d6b823190ab72866601bfba07d3f0abf6
12,Spyware,HTML.SpyAgent,Virus Share,2020-02-10,html,30/60,1,0,,,3b926d275ef56bb063d1e37042f211a3,fb0771b8040167e4b9510fe044a2357a0f4adc54f3bc5ab7a40cbae7ebd81d62
13,Spyware,Keylogger.HawkEye,VirusBay,2020-01-30,Win32 EXE,47/72,1,1,,,8d897a409a231c4bdb21ac3bcf9118b1,b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492
14,Spyware,Spyware.PasswordStealer,Virus Share,2020-03-10,Win32 EXE,53/72,0,0,0,0,69ad26a3aae3e2950e5a93ccc0cd1859,f2f275ca7e7d46c5ddd0e59fa845f59ab527cc5284f16c64104d67599ab933c7
15,Spyware,Trojan.GenKryptik,Virus Share,2020-02-06,Win32 EXE,55/73,0,0,0,0,9530e5c9e8591d5025e11a20f604520b,b64774a74e66515fbb11fed9bbba117b391f872d0b7b847acec67a4227de99a0
16,Ransomware,Ransom.Cryakl,VirusBay,2020-03-02,Win32 EXE,55/73,0,1,0,0,23a8bfb5bdbff2f294506019cf2f425f,0fa979b1f894b44984d8ada55962e73dc48bd01359475e079aab4325503dded4
17,Ransomware,Ramsom.Balaclav,VirusBay,2020-03-01,Win32 EXE,27/72,0,0,0,0,7ed4882c2a0d24c401cbce7536ddf792,5de4af86a4410fb6a4c7d54ba4586d35b6abbf2da183fed30ec71547a0a9f319
18,Ransomware,Ransom.Ryuk,VirusBay,2020-01-14,Win32 EXE,55/72,0,1,,1,3f5da05d62a70eb1212db39d5d6cf45e,f361afd4dd267d6f74f262033b700da652b4da1c0a21e14a8a468f6093d48e31
19,Ransomware,Trojan.DOCX,VirusBay,2019-11-19 ,DOCX,35/62,0,1,0,0,1a26c9b6ba40e4e3c3dce12de266ae10,6ccb6c2b2c074eea6e1bd9bb7ff2841fdf5466c646780a7644fbd907098f5b27
20,Spyware,Trojan.Lucifer,ANY RUN,2020-03-20,Win32 EXE,51/71,1,1,0,0,66a3124fe4ed45fae20e2bd4ee33c626,630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad
21,Adware,Adware.Linkvertise,ANY RUN,2020-04-06,Win32 EXE,13/72,1,0,0,0,25fcd5a2cc5590630ab8d971e82b70cb,422ea9cb2110591c932a58f32c8672aba1b08d3dd3e1d53c1edba0101b79174e
22,Rootkit,Rootkit.Bandios,ANY RUN,2018-03-23,Win32 EXE,52/71,0,0,0,0,4b042bfd9c11ab6a3fb78fa5c34f55d0,59c662a5207c6806046205348b22ee45da3f685fe022556716dbbd6643e61834
23,Ransomware,Ransom.GandCrab,ANY RUN,2020-05-18,Win32 EXE,36/72,1,1,,,d543a6c58e8e92d0b2f33abb270a4c3d,e94f7acb84d2b58a3019627ca866d1424f4d35520eb0da2fe33c1204b51545f2
24,Cryptominer,Miner.XMRig,ANY RUN,2019-08-24,Win32 EXE,56/71,0,0,,,5616a3471565d34d779b5b3d0520bb70,9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9
25,Cryptominer,Miner.lemon_duck,ANY RUN,2020-05-25,ps1,-,1,1,,,28b80843b13fab0986479b54310c8053,2520779dbaa8eebfde61aa4193bf75a44a89f8a7a8dcce12072f7fea1956b53d
26,Cryptominer,Trojan.Glupteba.Qwertyminer,ANY RUN,2020-05-04 ,Win32 EXE,60/72,1,0,,,d668e0990354d0ae209ec520cb80e052,5eb910915a13863b04317d17244c8d68cf9fad949f6ab6e5182861160f099e5f
27,Cryptominer,Miner.Tofsee,ANY RUN,2020-03-12,Win32 EXE,53/73,1,1,,,488bfb786944d1b236ac6254eb97dd69,3787e0f44b282dfcb0238c072490f8fd36c22fa40b1895dd52abed931e5385d3
28,Rootkit,Rootkit.Lamberts,Virus Share,2019-08-01,Win32 EXE,55/73,0,1,,,a00918f782ba83aa405614430c65aab6,adf6c75d1265e189036d4b5303feaeecb83f6d60db54c36544c43790cde26ace
29,Adware,Adware.Mindspark,Virus Share,2020-03-12 ,Win32 EXE,40/72,0,0,,,aeb471c20095e7d8557478a518d0fc8c,7e22bfc85e7cbd2ebca4f8f7900067b596cd5a8179acc2f211715ea230c41f0a
30,Adware,Adware.Sogou,Virus Share,2020-03-30,Win32 EXE,48/73,1,0,,,775307b867b19872f49aaa9fcc7c6800,013490159463a92d1f6f5b73618dcd143e3d9948fb82f094440368494db03659
31,Adware,Adware.FusionCore,Virus Share,2020-04-15,Win32 EXE,20/72,0,1,,,d4ce88978ea01afe4ec930e59f9abf61,"248dfd79d264aae38e13502609ce771e4ce0be63747d0c1e0c933e2ce0ebe097
"
32,Adware,Adware.Unruy,Virus Share,2019-09-04,Win32 EXE,55/68,1,0,,,3a4c09aba1b399a43a65a27aee9c90e0,369ed4c562a09c275e87bd6bed8c93b51b8460eb0cafd506dff8417ffdf5fba7
49 changes: 49 additions & 0 deletions data/MW_11_HIDS_3.csv
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
timestamp,"rule.level","rule.description","data.win.system.message","data.win.eventdata.commandLine","data.win.eventdata.targetObject","full_log","data.win.eventdata.details"
"May 28, 2020 @ 13:22:12.959",10,"Multiple Windows error events","""Id = {00000000-0000-0000-0000-000000000000}; ClientMachine = DESKTOP-HUE026H; User = NT AUTHORITY\NETWORK SERVICE; ClientProcessId = 5600; Component = Unknown; Operation = Start IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Product FROM Win32_BaseBoard; ResultCode = 0x80041032; PossibleCause = Unknown""",,,,
"May 28, 2020 @ 13:21:49.944",7,"Integrity checksum changed.",,,,"File '[x64] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon' checksum changed.
Old md5sum was: '27300ec6be2cfda4d500eefcbc4b10bb'
New md5sum is : '493b3b79baa4e287a340e5208a74d0bf'
Old sha1sum was: '685578e969396191bfb7c8bee92758a0267d52d6'
New sha1sum is : 'a1a3c1396dd3e1aab1a289c3e05d7742f33dd7a3'
",
"May 28, 2020 @ 13:21:49.929",7,"Integrity checksum changed.",,,,"File '[x64] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\VolatileUserMgrKey\1\S-1-5-21-438079597-2123118846-2669748851-1001' checksum changed.
Old md5sum was: '7b36002bf72275589ffef5f6fc1a89c6'
New md5sum is : '31795626566594565f825d3dd21c4a1b'
Old sha1sum was: 'a2d59c332c46bedea96282e398f570f4032d8d5b'
New sha1sum is : '37c1e2f897e63b8f8da74b8417d2353b2fb9c0b3'
",
"May 28, 2020 @ 13:20:24.537",9,"Benchmark for Windows audit: Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled': Status changed from 'not applicable' to failed",,,,,
"May 28, 2020 @ 13:20:15.707",7,"SessionEnv was unavailable to handle a critical notification event","""The winlogon notification subscriber <SessionEnv> was unavailable to handle a critical notification event.""",,,,
"May 28, 2020 @ 13:16:08.252",10,"ATT&CK T1060: Autorun Keys Modification","""Registry value set:
RuleName: T1060,RunKey
EventType: SetValue
UtcTime: 2020-05-28 12:50:22.647
ProcessGuid: {df9fc3d3-b38e-5ecf-0000-001084d02200}
ProcessId: 5724
Image: C:\Windows\SysWOW64\reg.exe
TargetObject: HKU\S-1-5-21-438079597-2123118846-2669748851-1001\Software\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS
Details: C:\Users\JOHNWI~1\AppData\Local\Temp\StikyNote.exe""",,"HKU\\S-1-5-21-438079597-2123118846-2669748851-1001\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\RESTART_STICKY_NOTESS","{""win"":{""system"":{""providerName"":""Microsoft-Windows-Sysmon"",""providerGuid"":""{5770385f-c22a-43e0-bf4c-06f5698ffbd9}"",""eventID"":""13"",""version"":""2"",""level"":""4"",""task"":""13"",""opcode"":""0"",""keywords"":""0x8000000000000000"",""systemTime"":""2020-05-28T12:50:22.648944600Z"",""eventRecordID"":""2033"",""processID"":""2260"",""threadID"":""3256"",""channel"":""Microsoft-Windows-Sysmon/Operational"",""computer"":""DESKTOP-HUE026H"",""severityValue"":""INFORMATION"",""message"":""\""Registry value set:\r\nRuleName: T1060,RunKey\r\nEventType: SetValue\r\nUtcTime: 2020-05-28 12:50:22.647\r\nProcessGuid: {df9fc3d3-b38e-5ecf-0000-001084d02200}\r\nProcessId: 5724\r\nImage: C:\\Windows\\SysWOW64\\reg.exe\r\nTargetObject: HKU\\S-1-5-21-438079597-2123118846-2669748851-1001\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\RESTART_STICKY_NOTESS\r\nDetails: C:\\Users\\JOHNWI~1\\AppData\\Local\\Temp\\StikyNote.exe\""""},""eventdata"":{""ruleName"":""T1060,RunKey"",""eventType"":""SetValue"",""utcTime"":""2020-05-28 12:50:22.647"",""processGuid"":""{df9fc3d3-b38e-5ecf-0000-001084d02200}"",""processId"":""5724"",""image"":""C:\\\\Windows\\\\SysWOW64\\\\reg.exe"",""targetObject"":""HKU\\\\S-1-5-21-438079597-2123118846-2669748851-1001\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\RESTART_STICKY_NOTESS"",""details"":""C:\\\\Users\\\\JOHNWI~1\\\\AppData\\\\Local\\\\Temp\\\\StikyNote.exe""}}}","C:\\Users\\JOHNWI~1\\AppData\\Local\\Temp\\StikyNote.exe"
"May 28, 2020 @ 13:16:08.220",10,"ATT&CK T1060: Direct Autorun Keys Modification","""Process Create:
RuleName:
UtcTime: 2020-05-28 12:50:22.635
ProcessGuid: {df9fc3d3-b38e-5ecf-0000-001084d02200}
ProcessId: 5724
Image: C:\Windows\SysWOW64\reg.exe
FileVersion: 10.0.18362.476 (WinBuild.160101.0800)
Description: Registry Console Tool
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
OriginalFileName: reg.exe
CommandLine: REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d ""C:\Users\JOHNWI~1\AppData\Local\Temp\StikyNote.exe""
CurrentDirectory: C:\Users\John Williams\Downloads\
User: DESKTOP-HUE026H\John Williams
LogonGuid: {df9fc3d3-b279-5ecf-0000-0020fd750300}
LogonId: 0x375FD
TerminalSessionId: 1
IntegrityLevel: Medium
Hashes: MD5=A01B3DFF957379E7632891A7992319CE,SHA256=45EFF48450C110B8A6D2A4C0FE31323423851298F6DADF32D73DF91DF7ECB797,IMPHASH=869B9FF91668F96EF68FBE0DB3602587
ParentProcessGuid: {df9fc3d3-b38e-5ecf-0000-0010e3ca2200}
ParentProcessId: 4776
ParentImage: C:\Windows\SysWOW64\cmd.exe
ParentCommandLine: ""C:\Windows\System32\cmd.exe"" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d ""C:\Users\JOHNWI~1\AppData\Local\Temp\StikyNote.exe""""","REG ADD HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d \""C:\\Users\\JOHNWI~1\\AppData\\Local\\Temp\\StikyNote.exe\""",,"{""win"":{""system"":{""providerName"":""Microsoft-Windows-Sysmon"",""providerGuid"":""{5770385f-c22a-43e0-bf4c-06f5698ffbd9}"",""eventID"":""1"",""version"":""5"",""level"":""4"",""task"":""1"",""opcode"":""0"",""keywords"":""0x8000000000000000"",""systemTime"":""2020-05-28T12:50:22.639126700Z"",""eventRecordID"":""2032"",""processID"":""2260"",""threadID"":""3256"",""channel"":""Microsoft-Windows-Sysmon/Operational"",""computer"":""DESKTOP-HUE026H"",""severityValue"":""INFORMATION"",""message"":""\""Process Create:\r\nRuleName: \r\nUtcTime: 2020-05-28 12:50:22.635\r\nProcessGuid: {df9fc3d3-b38e-5ecf-0000-001084d02200}\r\nProcessId: 5724\r\nImage: C:\\Windows\\SysWOW64\\reg.exe\r\nFileVersion: 10.0.18362.476 (WinBuild.160101.0800)\r\nDescription: Registry Console Tool\r\nProduct: Microsoft® Windows® Operating System\r\nCompany: Microsoft Corporation\r\nOriginalFileName: reg.exe\r\nCommandLine: REG ADD HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d \""C:\\Users\\JOHNWI~1\\AppData\\Local\\Temp\\StikyNote.exe\""\r\nCurrentDirectory: C:\\Users\\John Williams\\Downloads\\\r\nUser: DESKTOP-HUE026H\\John Williams\r\nLogonGuid: {df9fc3d3-b279-5ecf-0000-0020fd750300}\r\nLogonId: 0x375FD\r\nTerminalSessionId: 1\r\nIntegrityLevel: Medium\r\nHashes: MD5=A01B3DFF957379E7632891A7992319CE,SHA256=45EFF48450C110B8A6D2A4C0FE31323423851298F6DADF32D73DF91DF7ECB797,IMPHASH=869B9FF91668F96EF68FBE0DB3602587\r\nParentProcessGuid: {df9fc3d3-b38e-5ecf-0000-0010e3ca2200}\r\nParentProcessId: 4776\r\nParentImage: C:\\Windows\\SysWOW64\\cmd.exe\r\nParentCommandLine: \""C:\\Windows\\System32\\cmd.exe\"" /c REG ADD HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d \""C:\\Users\\JOHNWI~1\\AppData\\Local\\Temp\\StikyNote.exe\""\""""},""eventdata"":{""utcTime"":""2020-05-28 12:50:22.635"",""processGuid"":""{df9fc3d3-b38e-5ecf-0000-001084d02200}"",""processId"":""5724"",""image"":""C:\\\\Windows\\\\SysWOW64\\\\reg.exe"",""fileVersion"":""10.0.18362.476 (WinBuild.160101.0800)"",""description"":""Registry Console Tool"",""product"":""Microsoft® Windows® Operating System"",""company"":""Microsoft Corporation"",""originalFileName"":""reg.exe"",""commandLine"":""REG ADD HKCU\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d \\\""C:\\\\Users\\\\JOHNWI~1\\\\AppData\\\\Local\\\\Temp\\\\StikyNote.exe\\\"""",""currentDirectory"":""C:\\\\Users\\\\John Williams\\\\Downloads\\\\"",""user"":""DESKTOP-HUE026H\\\\John Williams"",""logonGuid"":""{df9fc3d3-b279-5ecf-0000-0020fd750300}"",""logonId"":""0x375fd"",""terminalSessionId"":""1"",""integrityLevel"":""Medium"",""hashes"":""MD5=A01B3DFF957379E7632891A7992319CE,SHA256=45EFF48450C110B8A6D2A4C0FE31323423851298F6DADF32D73DF91DF7ECB797,IMPHASH=869B9FF91668F96EF68FBE0DB3602587"",""parentProcessGuid"":""{df9fc3d3-b38e-5ecf-0000-0010e3ca2200}"",""parentProcessId"":""4776"",""parentImage"":""C:\\\\Windows\\\\SysWOW64\\\\cmd.exe"",""parentCommandLine"":""\\\""C:\\\\Windows\\\\System32\\\\cmd.exe\\\"" /c REG ADD HKCU\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d \\\""C:\\\\Users\\\\JOHNWI~1\\\\AppData\\\\Local\\\\Temp\\\\StikyNote.exe\\\""""}}}",
"May 28, 2020 @ 13:15:58.499",10,"Multiple Windows error events","""Id = {00000000-0000-0000-0000-000000000000}; ClientMachine = DESKTOP-HUE026H; User = DESKTOP-HUE026H\John Williams; ClientProcessId = 7104; Component = Unknown; Operation = Start IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PhysicalMemory WHERE Tag='Physical Memory 0'; ResultCode = 0x80041032; PossibleCause = Unknown""",,,,
Loading

0 comments on commit f1241e0

Please sign in to comment.