| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
HermeticWiper has used the name |
| Enterprise | T1112 | 修改注册表 |
HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.[1][3][5] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
HermeticWiper can load drivers by creating a new service using the |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
HermeticWiper can decompress and copy driver files using |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
HermeticWiper can use |
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
HermeticWiper has the ability to deploy through an infected system's default domain policy.[8] |
| Enterprise | T1562 | .006 | 妨碍防御: Indicator Blocking |
HermeticWiper has the ability to set the |
| Enterprise | T1485 | 数据销毁 |
HermeticWiper can recursively wipe folders and files in |
|
| Enterprise | T1083 | 文件和目录发现 |
HermeticWiper can enumerate common folders such as My Documents, Desktop, and AppData.[1][5] |
|
| Enterprise | T1489 | 服务停止 |
HermeticWiper has the ability to stop the Volume Shadow Copy service.[5] |
|
| Enterprise | T1106 | 本机API |
HermeticWiper can call multiple Windows API functions used for privilege escalation, service execution, and to overwrite random bites of data.[1][3][8][5] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
HermeticWiper can compress 32-bit and 64-bit driver files with the Lempel-Ziv algorithm.[2][3][5] |
| Enterprise | T1561 | .001 | 磁盘擦除: Disk Content Wipe |
HermeticWiper has the ability to corrupt disk partitions and obtain raw disk access to destroy data.[3][1] |
| .002 | 磁盘擦除: Disk Structure Wipe |
HermeticWiper has the ability to corrupt disk partitions, damage the Master Boot Record (MBR), and overwrite the Master File Table (MFT) of all available physical drives.[1][2][3][5] |
||
| Enterprise | T1070 | 移除指标 |
HermeticWiper can disable pop-up information about folders and desktop items and delete Registry keys to hide malicious services.[3][8] |
|
| .001 | Clear Windows Event Logs |
HermeticWiper can overwrite the |
||
| .004 | File Deletion |
HermeticWiper has the ability to overwrite its own file with random bites.[3][8] |
||
| Enterprise | T1082 | 系统信息发现 |
HermeticWiper can determine the OS version, bitness, and enumerate physical drives on a targeted host.[1][3][8][5] |
|
| Enterprise | T1529 | 系统关机/重启 |
HermeticWiper can initiate a system shutdown.[1][5] |
|
| Enterprise | T1490 | 系统恢复抑制 |
HermeticWiper can disable the VSS service on a compromised host using the service control manager.[3][8][5] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
HermeticWiper can create system services to aid in executing the payload.[1][3][5] |
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
HermeticWiper has the ability to receive a command parameter to sleep prior to carrying out destructive actions on a targeted host.[3] |
| Enterprise | T1134 | 访问令牌操控 |
HermeticWiper can use |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
HermeticWiper has the ability to use scheduled tasks for execution.[2] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
The HermeticWiper executable has been signed with a legitimate certificate issued to Hermetica Digital Ltd.[2][3][4][5] |