Analytics Story: PathWiper

Description

This analytic story identifies activity linked to PathWiper, a destructive malware that targeted organizations in Ukraine. The attack typically begins with the execution of a malicious VBScript (e.g., uacinstall.vbs) delivered through a legitimate remote management tool. The script drops and launches a disguised payload such as sha256sum.exe. Once active, PathWiper enumerates local drives, volumes, and even disconnected network shares. It then attempts to dismount volumes and overwrites critical NTFS structures and boot sector, with random data, leaving the system unbootable and data irrecoverable.

Why it matters

PathWiper is a destructive malware campaign that surfaced during the conflict in Ukraine, designed with a single purpose, to render systems unusable. The operation begins quietly, leveraging a legitimate remote administration tool to deliver a malicious script (uacinstall.vbs). This script then drops and executes a disguised binary such as sha256sum.exe, masking its true intent. Once triggered, PathWiper systematically scans all available storage, including local drives, connected volumes, and even offline network shares. It dismounts volumes to bypass file locks and launches parallel threads to overwrite the very foundations of the NTFS file system—the master boot record, file table, logs, and boot sector. By corrupting these core structures with random data, PathWiper ensures that recovery is nearly impossible. Unlike earlier wipers, which indiscriminately destroyed data, PathWiper demonstrates a more deliberate approach, validating storage labels before carrying out its attack. This precision suggests a sophisticated adversary with both access and intent to maximize disruption. The campaign highlights how destructive malware can masquerade behind legitimate tools, evade casual detection, and inflict lasting operational damage on its targets.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Windows Access Token Manipulation SeDebugPrivilege Create Process with Token Anomaly
Windows Access Token Winlogon Duplicate Handle In Uncommon Path Token Impersonation/Theft Anomaly
Windows Excel ActiveMicrosoftApp Child Process Distributed Component Object Model Anomaly
Windows Process Execution in Temp Dir Create or Modify System Process, Match Legitimate Resource Name or Location Anomaly
Windows Process Writing File to World Writable Path Mshta Hunting
Windows Raw Access To Disk Volume Partition Disk Structure Wipe Anomaly
Windows Raw Access To Master Boot Record Drive Disk Structure Wipe TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
CrowdStrike ProcessRollup2 N/A crowdstrike:events:sensor crowdstrike
Sysmon EventID 1 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 10 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 9 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Security 4688 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 4703 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security

References


Source: GitHub | Version: 1