# A Deep-dive Analysis of a New Wiper Malware Disguised as Tokyo Olympics Document **[blog.cyble.com/2021/08/02/a-deep-dive-analysis-of-a-new-wiper-malware-disguised-as-tokyo-olympics-document/](https://blog.cyble.com/2021/08/02/a-deep-dive-analysis-of-a-new-wiper-malware-disguised-as-tokyo-olympics-document/)** August 2, 2021 Recently, Cyble Research Labs came across a new malware sample on the surface web. The malware in question belongs to the Wiper family. The sample was posted by a security researcher on [Twitter. From VirusTotal, we learned that the original name of the malware is【至急】東京オリンピッ](https://twitter.com/_lpvoid/status/1420039826330501126) ク開催に伴うサイバー攻撃等発生に関する被害報告について.exe. The translation of the file name is “[Urgent] About the damage report about the occurrence of cyber-attacks etc. accompanying **the Tokyo Olympics .exe”.** In this case, the name of the sample suggests that it could be used to leverage the interest surrounding the Tokyo Olympics. The Wiper malware family has been created with the intent to delete selected documents containing extensions that are predefined in the malware by the Threat Actor (TA). Figure 1 showcases the complete execution flow of the Wiper malware. ----- _Figure 1 Wiper Malware Execution Flow_ ## Technical Analysis The static analysis of the malware indicated that it is packed using Ultimate Packer for Executables (UPX), an open-source executable packer that supports various file formats across operating systems. After unpacking the malware, we found that it is an x86 architecture console-based application. It was developed using C/C++ language and compiled on “2021-07-20 06:52:05”. These details are shown in Figure 1. The malware also uses an Adobe PDF icon to trick unsuspecting users into opening the malware. _Figure 2: Malware’s Static Details_ Based on our initial observations, Cyble researchers found that the malware doesn’t perform any other activities apart from deleting itself from the victim’s device. Similarly, we can see in Figure 3, that the malware executes the “Del” command to delete itself. ----- _Figure 3: Wiper Malware’s Process Tree_ ## Code Analysis Our research indicates that the TA behind the malware has added multiple anti-VM/antidebugging/AntiSandBox techniques, as shown in Figure 4, These techniques include checking for ProcMon, VM Detection, Debugger Detection, Sleep, and EnumWindows etc. _Figure 4: Code to Detect VM and Debugger_ Using EnumWindows API Call, the malware checks if any strings mentioned in Table 1 are matching any running processes in the top-level application titles to check whether any malware analysis tools are running in the background. ----- PROCMON_WINDOW_CLASS OllyDbg TIdaWindow WinDbgFrameClass FilemonClass ID RegmonClass PROCEXPL TCPViewClass SmartSniff Autoruns CNetmonMainFrame TFormFileAlyzer2 ProcessHacker _Table 1 Running Process String_ Our research indicates that the Wiper malware also checks for the processes shown in Table 2 to determine if it is running in any malware analysis environment. In case these processes are running, the malware exits and deletes itself. ----- Wireshark.exe apateDNS.exe Autoruns.exe bindiff.exe idaq.exe idaq64.exe Procmon.exe x64dbg.exe x32dbg.exe ollydbg.exe ImmunityDebugger.exe VBoxTray.exe VBoxService.exe msedge.exe VirtualBox.exe javaw.exe x96dbg.exe idaw.exe windbg.exe dnSpy.exe HxD.exe Scylla_x64.exe Scylla_x86.exe regmon.exe procexp.exe procexp64.exe Tcpview.exe smsniff.exe FakeNet.exe netmon.exe PEiD.exe LordPE.exe PE-bear.exe PPEE.exe die.exe diel.exe pexplorer.exe depends.exe ResourceHacker.exe FileAlyzer2.exe processhacker.exe Regshot-x64-Unicode.exe _Table 2: Process List_ Figure 5 shows the malware comparing the running processes with the process list. _Figure 5: Process Comparison_ The malware also checks whether any soft breakpoint has been added on a VMDetection method or not, as shown in Figure 6. ----- _Figure 6 Code to check soft_ _breakpoints_ The TA has added the above checks to ensure that the malware runs on the physical device and not on any malware analysis environment. If any one of the checks is positive, the malware exits and deletes itself. Once all the checks are done, the malware executes a series of commands to delete the files that have the extension specified by the TA in the malware, as shown in Figure 7. _Figure 7: Malware Executing Command to Delete *.doc Files_ The series of commands used to delete files that have the extensions specified by the TA are given in Table 3. del /S /Q *.doc c:\\users\\%username%\\ > nul del /S /Q *.docm c:\\users\\%username%\\ > nul del /S /Q *.docx c:\\users\\%username%\\ > nul del /S /Q *.dot c:\\users\\%username%\\ > nul del /S /Q *.dotm c:\\users\\%username%\\ > nul del /S /Q *.dotx c:\\users\\%username%\\ > nul del /S /Q *.pdf c:\\users\\%username%\\ > nul del /S /Q *.csv c:\\users\\%username%\\ > nul del /S /Q *.xls c:\\users\\%username%\\ > nul del /S /Q *.xlsx c:\\users\\%username%\\ > nul del /S /Q *.xlsm c:\\users\\%username%\\ > nul del /S /Q *. ppt c:\\users\\%username%\\ > nul del /S /Q *.pptx c:\\users\\%username%\\ > nul del /S /Q *. pptm c:\\users\\%username%\\ > nul del /S /Q *.jtdc c:\\users\\% username% \> nul del /S /Q *.jttc c:\\users\\%username%\\ > nul **del /S /Q *.jtd c:\\users\\%username%\\ > nul** del /S /Q *.jtt c:\\users\\%username%\\ > nul del /S /Q *.txt c:\\users\\%username%\\ > nul del /S /Q *.exe c:\\users\\%username%\\ > nul del /S /Q *.log c:\\users\\%username%\\ > nul _Table 3: Commands Executed by Malware_ As we can see in Table 3, the malware checks for several file extensions including .jtd, which is an extension for a Japanese word processor. Once it executes all the commands given in Table 3, it runs the curl command to access an adult website. However, the intent of this behavior is unknown. Figure 8 shows the execution of the curl command to access the adult website. ----- _Figure 8: Curl Command Execution_ The malware self-destructs after completing all the activities discussed above. ## Conclusion Based on the name of malware executable file, “[Urgent] About the damage report about the **occurrence of cyber–attacks etc. accompanying the Tokyo Olympics .exe”, and the fact that the** malware checks for. jtd extensions,we suspect that it has been potentially created to leverage the recent interest around the Tokyo Olympics. The TA provided this malware with the functionality to delete files that have extensions specified by the TA. It does not demonstrate any other behavior that is generally displayed by malware. Cyble Research Labs is continuously monitoring security threats, whether they are ongoing or emerging. We will continue to update our readers with our latest findings. ## Our Recommendations We have listed some of the essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the suggestions given below: Use strong passwords and enforce multi-factor authentication wherever possible. Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic. Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile. Refrain from opening untrusted links and email attachments without verifying their authenticity. Conduct regular backup practices and keep those backups offline or in a separate network. ## MITRE ATT&CK® Techniques: **Tactic** **Technique ID** **Technique Name** ----- **Execution** [T1204](https://attack.mitre.org/techniques/T1204/) User Execution **Defense** [T1497](https://attack.mitre.org/techniques/T1497/) Virtualization/Sandbox Evasion **Impact** [T1485](https://attack.mitre.org/techniques/T1485/) Data Destruction ## Indicators of Compromise (IoCs): **Indicators** **Indicator** **type** **Description** fb80dab592c5b2a1dcaaf69981c6d4ee7dbf6c1f25247e2ab648d4d0dc115a97 Hash SHA-256 295d0aa4bf13befebafd7f5717e7e4b3b41a2de5ef5123ee699d38745f39ca4f Hash SHA-256 ## Generic Signatures and Rules ### Yara Rules ``` rule win32_tokyoolympicdeleter { meta: author= "Cyble Research" date= "2021-08-03" description= "Coverage for Malware targeting Tokyo Olympics" hash= "fb80dab592c5b2a1dcaaf69981c6d4ee7dbf6c1f25247e2ab648d4d0dc115a97" strings: $header= "MZ" $sig1 = "meClassOFilemon" wide ascii $sig2 = "iewSmartSniffg" wide ascii $sig3 = "TFormFileAlyzer2" wide ascii $sig4 = "TIdaWindow" wide ascii condition: $header at 0 and (2 of ($sig*)) } ## About Us ``` ----- [Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from](https://cyble.com/) cybercrimes and exposure in the Darkweb. Its prime focus is to provide organizations with real-time visibility to their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit [www.cyble.com.](https://cyble.com/) -----