NotPetya is malware that was used by Sandworm Team in a worldwide attack starting on June 27, 2017. While NotPetya appears as a form of ransomware, its main purpose was to destroy data and disk structures on compromised systems; the attackers never intended to make the encrypted data recoverable. As such, NotPetya may be more appropriately thought of as a form of wiper malware. NotPetya contains worm-like features to spread itself across a computer network using the SMBv1 exploits EternalBlue and EternalRomance.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
NotPetya can use |
|
| Enterprise | T1036 | 伪装 | ||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.[1][2][5] |
| Enterprise | T1486 | 数据加密以实现影响 |
NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA.[1][2][4] |
|
| Enterprise | T1083 | 文件和目录发现 |
NotPetya searches for files ending with dozens of different file extensions prior to encryption.[4] |
|
| Enterprise | T1078 | .003 | 有效账户: Local Accounts |
NotPetya can use valid credentials with PsExec or |
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
NotPetya uses |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
NotPetya uses |
| Enterprise | T1529 | 系统关机/重启 |
NotPetya will reboot the system one hour after infection.[1][4] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
NotPetya can use PsExec to help propagate itself across a network.[1][2] |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
NotPetya determines if specific antivirus programs are running on an infected host machine.[4] |
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
NotPetya can use PsExec, which interacts with the |
| Enterprise | T1210 | 远程服务漏洞利用 |
NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.[1][2][4] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
NotPetya creates a task to reboot the system one hour after infection.[1] |
| ICS | T0866 | Exploitation of Remote Services |
NotPetya initially infected IT networks, but by means of an exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks. [7] |
|
| ICS | T0867 | Lateral Tool Transfer |
NotPetya can move laterally through industrial networks by means of the SMB service. [7] |
|
| ICS | T0828 | Loss of Productivity and Revenue |
NotPetya disrupted manufacturing facilities supplying vaccines, resulting in a halt of production and the inability to meet demand for specific vaccines. [8] |
|