Disk Content Wipe
Adversaries may erase the contents of storage devices to interrupt availability of systems and network resources. Unlike file-level destruction, disk content wiping targets arbitrary raw disk sectors, making recovery through normal storage interfaces impossible. Attackers gain direct disk access via OS raw device handles (e.g., \\.\PhysicalDrive0 on Windows, /dev/sda on Linux), third-party kernel drivers like RawDisk (eltrawdrv.sys), or built-in utilities such as cipher.exe, dd, and shred. Real-world destructive campaigns include HermeticWiper (Ukraine 2022), WhisperGate (Ukraine 2022), AcidRain/AcidPour (satellite modems), and Lazarus Group's WhiskeyAlfa malware overwriting the first 64MB of every drive. These attacks are often staged alongside credential dumping and lateral movement to maximize organizational impact.
// T1561.001 — Disk Content Wipe
// Branch 1: cipher.exe used to wipe free space (MegaCortex, Nearest Neighbor/Volexity)
let CipherWipe = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "cipher.exe"
| where ProcessCommandLine has_any ("/w", "-w")
| extend DetectionBranch = "cipher.exe freespace wipe";
// Branch 2: Windows built-in tools / LOLBins writing to raw disk device paths
let RawDiskAccess = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
"\\\\.\\PhysicalDrive", "\\\\.\\GLOBALROOT",
"\\\\.\\HarddiskVolume", "\\\\.\\Disk",
"IOCTL_DISK_FORMAT_TRACKS", "FSCTL_DISMOUNT_VOLUME"
)
| extend DetectionBranch = "raw disk device access in command line";
// Branch 3: Known destructive wiper driver names loaded (RawDisk, HermeticWiper drivers)
let WiperDriverLoad = DeviceImageLoadEvents
| where Timestamp > ago(24h)
| where FileName has_any (
"eltrawdrv.sys", "rawdisk.sys", "epmntdrv.sys",
"DRV_X64.sys", "DRV_X86.sys", "DRV_XP_X64.sys", "DRV_XP_X86.sys"
)
| extend DetectionBranch = "wiper kernel driver loaded"
| project Timestamp, DeviceName, AccountName,
FileName, FolderPath,
InitiatingProcessFileName, InitiatingProcessCommandLine,
DetectionBranch;
// Branch 4: New service/driver installed with suspicious wiper-related names
let WiperDriverInstall = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has "HKLM\\SYSTEM\\CurrentControlSet\\Services"
| where RegistryValueData has_any (
"rawdisk", "eltraw", "epmntdrv", "DRV_X64", "DRV_X86"
)
| extend DetectionBranch = "wiper driver service registry key created"
| project Timestamp, DeviceName, AccountName,
RegistryKey, RegistryValueData,
InitiatingProcessFileName, InitiatingProcessCommandLine,
DetectionBranch;
// Branch 5: dd.exe (Windows port) or wmic diskdrive writing large zero/random blocks
let DDToolUsage = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "dd.exe"
| where ProcessCommandLine has_any (
"if=/dev/zero", "if=/dev/urandom", "if=\\\\.\\zero",
"of=\\\\.\\PhysicalDrive", "of=/dev/sd", "bs="
)
| extend DetectionBranch = "dd tool disk overwrite";
// Union all Windows branches
union kind=outer
(CipherWipe | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionBranch),
(RawDiskAccess | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionBranch),
(DDToolUsage | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionBranch)
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- cipher.exe /w legitimately used by IT security teams to comply with NIST 800-88 media sanitization policies before asset disposal or drive reuse
- Disk imaging or cloning tools (Clonezilla, Acronis, Norton Ghost, Macrium Reflect) that access raw disk handles during backup or restoration operations
- Disk benchmarking utilities (CrystalDiskMark, HD Tune, ATTO Disk Benchmark) that open raw device handles for performance testing
- Forensic workstations running EnCase, FTK, or Autopsy that access physical drives directly during evidence collection
- Virtualization platforms (VMware, Hyper-V, VirtualBox) creating or reconfiguring virtual disk files with raw device access
References (10)
- https://attack.mitre.org/techniques/T1561/001/
- https://www.justice.gov/opa/press-release/file/1092091/download
- https://web.archive.org/web/20160303200515/https:/operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
- https://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
- https://www.crowdstrike.com/blog/how-crowdstrike-falcon-protects-against-wiper-malware-used-in-ukraine-attacks/
- https://www.sentinelone.com/labs/agrius-from-destruction-to-disruption/
- https://www.sentinelone.com/labs/acidpour-new-embedded-wiper-variant-of-acidrain-appears-in-ukraine/
- https://blog.malwarebytes.com/threat-intelligence/2022/01/looking-into-the-whispergate-wiper/
- https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1561.001/T1561.001.md
Unlock Pro Content
Get the full detection package for T1561.001 including response playbook, investigation guide, and atomic red team tests.