HermeticWizard is a worm that has been used to spread HermeticWiper in attacks against organizations in Ukraine since at least 2022.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1110 | .001 | Brute Force: Password Guessing |
HermeticWizard can use a list of hardcoded credentials in attempt to authenticate to SMB shares.[1] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
HermeticWizard can use |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
HermeticWizard has the ability to use |
Enterprise | T1559 | .001 | Inter-Process Communication: Component Object Model |
HermeticWizard can execute files on remote machines using DCOM.[1] |
Enterprise | T1570 | Lateral Tool Transfer |
HermeticWizard can copy files to other machines on a compromised network.[1] |
|
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
HermeticWizard has been named |
Enterprise | T1106 | Native API |
HermeticWizard can connect to remote shares using |
|
Enterprise | T1046 | Network Service Discovery |
HermeticWizard has the ability to scan ports on a compromised network.[1] |
|
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
HermeticWizard has the ability to encrypt PE files with a reverse XOR loop.[1] |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems.[1] |
Enterprise | T1018 | Remote System Discovery |
HermeticWizard can find machines on the local network by gathering known local IP addresses through |
|
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
HermeticWizard has been signed by valid certificates assigned to Hermetica Digital.[1] |
Enterprise | T1218 | .010 | System Binary Proxy Execution: Regsvr32 |
HermeticWizard has used |
.011 | System Binary Proxy Execution: Rundll32 |
HermeticWizard has the ability to create a new process using |
||
Enterprise | T1569 | .002 | System Services: Service Execution |
HermeticWizard can use |
Enterprise | T1047 | Windows Management Instrumentation |
HermeticWizard can use WMI to create a new process on a remote machine via |