heroui logo

Clear Unallocated Sector Using Cipher App

Splunk Security Content

View Source
Summary
The detection rule 'Clear Unallocated Sector Using Cipher App' focuses on identifying the execution of the 'cipher.exe' application with the '/w' flag, which is used to wipe unallocated disk space. This method is commonly exploited by ransomware attackers to mitigate the chances of successful forensic recovery of deleted files. The rule utilizes telemetry data from Endpoint Detection and Response (EDR) agents, particularly monitoring process names, command-line inputs, and parent processes to detect suspicious activities. The analysis is built on various data sources, including Sysmon and Windows event logs. If the execution of this command is recognized in a potentially malicious context, it raises critical alarms for incident response, indicating an effort to impede the investigation into a ransomware incident. The implementation requires ensuring that EDR logs contain comprehensive process execution details and conform to Splunk's data models.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1070.004
  • T1070
Created: 2024-12-10