{"id":18542,"date":"2022-03-18T15:10:13","date_gmt":"2022-03-18T23:10:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/18\/news-12275\/"},"modified":"2022-03-18T15:10:13","modified_gmt":"2022-03-18T23:10:13","slug":"news-12275","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/18\/news-12275\/","title":{"rendered":"Double header: IsaacWiper and CaddyWiper"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 18 Mar 2022 22:51:14 +0000<\/strong><\/p>\n<p>As war in Ukraine rages, new destructive malware continues to be discovered. In this short blog post, we will review IsaacWiper and CaddyWiper, two new wipers that do not have much in common based on their source code, but with the same intent of destroying targeted Ukrainian computer systems.<\/p>\n<h2>IsaacWiper<\/h2>\n<p>IsaacWiper was one of the artifacts security company ESET reported to be targeting Ukraine. Other artifacts were named as HermeticWiper (wiper), HermeticWizard (spreader) and HermeticRansom (ransomware). IsaacWiper is far less advanced than HermeticWiper, the first wiper that was found which we analyzed&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/hermeticwiper-a-detailed-analysis-of-the-destructive-malware-that-targeted-ukraine\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n<p>IsaacWiper is made of an executable, compiled with Visual Studio. The executable has imported functions like DeviceIoControl, WriteFile, MoveFile, GetDiskFreeSpaceEx, FindNextFileW. Although these functions are legitimate, the combination of all these imports could be suspicious. Sections analysis, on other hand, is perfectly normal. No strange segments are found, and entropy has the expected values:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55176\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/1-66\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1.png\" data-orig-size=\"800,264\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1-300x99.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1-600x198.png\" loading=\"lazy\" width=\"800\" height=\"264\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1.png\" alt=\"\" class=\"wp-image-55176\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1-300x99.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/1-600x198.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<p>The sample is presented in DLL form with just one export, named&nbsp;<em>_Start@4&nbsp;<\/em>that contains the main functionality of the malware:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55177\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/2-56\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2.png\" data-orig-size=\"544,377\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2-300x208.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2.png\" loading=\"lazy\" width=\"544\" height=\"377\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2.png\" alt=\"\" class=\"wp-image-55177\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2.png 544w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/2-300x208.png 300w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/figure>\n<p>The malware will iterate through all system disks, overwriting the first bytes of these disks:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55178\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/3-47\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3.png\" data-orig-size=\"800,115\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3-300x43.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3-600x86.png\" loading=\"lazy\" width=\"800\" height=\"115\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3.png\" alt=\"\" class=\"wp-image-55178\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3-300x43.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/3-600x86.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<p>The following chunk shows an extract of the code responsible for that behavior. Also, it can be seen how the volume is unlocked after write operations:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55179\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/4-32\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4.png\" data-orig-size=\"635,178\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4-300x84.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4-600x168.png\" loading=\"lazy\" width=\"635\" height=\"178\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4.png\" alt=\"\" class=\"wp-image-55179\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4.png 635w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4-300x84.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4-600x168.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/4-630x178.png 630w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/figure>\n<p>We have found that not only the physicalDrive but also partitions are wiped in the process. The wiper will iterate through the filesystem, enumerating files and overwriting them. This behavior is similar to ransomware activity, but in this case there is no decryption key. Once the data has been overwritten, it is lost:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55181\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/5-25\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5.png\" data-orig-size=\"800,325\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5-300x122.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5-600x244.png\" loading=\"lazy\" width=\"800\" height=\"325\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5.png\" alt=\"\" class=\"wp-image-55181\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5-300x122.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/5-600x244.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<p>The attackers left in the code various log strings. An example of one of these debug strings, being referenced inline is presented below:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55182\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/6-19\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6.png\" data-orig-size=\"548,228\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"6\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6-300x125.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6.png\" loading=\"lazy\" width=\"548\" height=\"228\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6.png\" alt=\"\" class=\"wp-image-55182\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6.png 548w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/6-300x125.png 300w\" sizes=\"auto, (max-width: 548px) 100vw, 548px\" \/><\/figure>\n<p>In fact, these debug strings describe pretty well the malware functionality. All debug strings are presented below:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55183\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/7-15\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7.png\" data-orig-size=\"629,270\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"7\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7-300x129.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7-600x258.png\" loading=\"lazy\" width=\"629\" height=\"270\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7.png\" alt=\"\" class=\"wp-image-55183\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7.png 629w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7-300x129.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7-600x258.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/7-195x85.png 195w\" sizes=\"auto, (max-width: 629px) 100vw, 629px\" \/><\/figure>\n<p>As it can be seen, the attackers&#8217; goal is destroying data on victims systems. Affected users will lose their files, and their computers will be unbootable, forcing them to reinstall the OS.<\/p>\n<h2>CaddyWiper<\/h2>\n<p>CaddyWiper is a 3rd Wipper (after HermeticWiper and IzaakWiper) that was observed in this year&#8217;s attack on Ukraine. In contrast to HermeticWiper, this one is very small, and has less complex capabilities.<\/p>\n<p>The sample is not signed and its compilation date is: 14 March 2022 07:19:36 UTC. The executable is dedicated to destroying files and partition information for each available disk.<\/p>\n<p>The main function of the wiper can be seen below:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55184\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/8-10\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8.png\" data-orig-size=\"681,745\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"8\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8-274x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8-548x600.png\" loading=\"lazy\" width=\"681\" height=\"745\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8.png\" alt=\"\" class=\"wp-image-55184\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8.png 681w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8-274x300.png 274w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/8-548x600.png 548w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n<p>First, the wiper checks if it is running on the Primary Domain Controler. The malware will avoid trashing Domain Controlers, probably because it wants to keep them alive for the purpose of propagation.<\/p>\n<p>If the current machine is not a Domain Controler, the wiping starts. It recursively wipes files in the &#8220;C:Users&#8221; directory. Then, it iterates over available hard disks, starting from &#8220;D:&#8221; and wipes recursively all the files it can access.<\/p>\n<p>The wiping is done in the following way:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55185\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/9-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9.png\" data-orig-size=\"749,664\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"9\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9-300x266.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9-600x532.png\" loading=\"lazy\" width=\"749\" height=\"664\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9.png\" alt=\"\" class=\"wp-image-55185\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9.png 749w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9-300x266.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/9-600x532.png 600w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/figure>\n<p>It tries to grant access to the files before writing:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55186\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/10-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10.png\" data-orig-size=\"800,720\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10-300x270.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10-600x540.png\" loading=\"lazy\" width=\"800\" height=\"720\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10.png\" alt=\"\" class=\"wp-image-55186\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10-300x270.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/10-600x540.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<p>All the files\/directories are enumerated by well-known APIs: FindFirstFileA\/FindNextFileA. If the found element is a directory, the function is called recursively. And if it is a file, a new buffer filled with 0s is allocated, and the file content is overwritten with it. The buffer is limited to 10 Mb max, so if the file is bigger than this, only the beginning of it will be wiped.<\/p>\n<p>Interestingly, this enumeration starts from the drive letter D, so if there are any disks mounted as A or B, they are skipped. Finally the malware wipes layout information of the available disks\/partitions:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55187\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/11-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11.png\" data-orig-size=\"798,574\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"11\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11-300x216.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11-600x432.png\" loading=\"lazy\" width=\"798\" height=\"574\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11.png\" alt=\"\" class=\"wp-image-55187\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11.png 798w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11-300x216.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/11-600x432.png 600w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/figure>\n<p>It starts from the &#8220;PHYSICALDRIVE9&#8221;, and at each iteration decrements the partition number by one.<\/p>\n<p>It uses for this purpose IOCTL sent to the drive device: IOCTL_DISK_SET_DRIVE_LAYOUT_EX, and sets empty buffer as the new layout.<\/p>\n<p>The sample is very mildly obfuscated and most of the used strings are stack-based. Also the ImportTable is very small, containing only one function. All the needed functions are dynamically retrieved, with the help of a custom lookup routine:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55188\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/12-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12.png\" data-orig-size=\"419,431\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"12\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12-292x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12.png\" loading=\"lazy\" width=\"419\" height=\"431\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12.png\" alt=\"\" class=\"wp-image-55188\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12.png 419w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/12-292x300.png 292w\" sizes=\"auto, (max-width: 419px) 100vw, 419px\" \/><\/figure>\n<p>CaddyWiper is extremely light in comparison to HermeticWiper, which was the most complex from all the wipers that has been associated with those attacks. There is no code overlap between them, and most likely they have been written by different authors.<\/p>\n<h2>Protection<\/h2>\n<p>Malwarebytes clients are protected against both of these wipers:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55189\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/13-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13.png\" data-orig-size=\"463,303\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"13\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13-300x196.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13.png\" loading=\"lazy\" width=\"463\" height=\"303\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13.png\" alt=\"\" class=\"wp-image-55189\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13.png 463w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/13-300x196.png 300w\" sizes=\"auto, (max-width: 463px) 100vw, 463px\" \/><\/figure>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"55190\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/attachment\/14-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14.png\" data-orig-size=\"469,306\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"14\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14-300x196.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14.png\" loading=\"lazy\" width=\"469\" height=\"306\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14.png\" alt=\"\" class=\"wp-image-55190\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14.png 469w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/14-300x196.png 300w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><\/figure>\n<h2>References<\/h2>\n<ol>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2022\/03\/01\/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine\/\">https:\/\/www.welivesecurity.com\/2022\/03\/01\/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine\/<\/a><\/li>\n<li><a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-ukraine-hit-by-destructive-attacks-before-and-during-the-russian-invasion-with-hermet\/\">https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-ukraine-hit-by-destructive-attacks-before-and-during-the-russian-invasion-with-hermet\/<\/a><\/li>\n<\/ol>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>IsaacWiper<\/strong><\/p>\n<p>13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033<\/p>\n<p><strong>CaddyWiper<\/strong><\/p>\n<p>a294620543334a721a2ae8eaaf9680a0786f4b9a216d75b55cfd28f39e9430ea<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/\">Double header: IsaacWiper and CaddyWiper<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 18 Mar 2022 22:51:14 +0000<\/strong><\/p>\n<p>We review two of the latest wipers that have targeted Ukraine recently.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/double-header-isaacwiper-and-caddywiper\/\">Double header: IsaacWiper and CaddyWiper<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25438,25439,12040,8642],"class_list":["post-18542","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-caddywiper","tag-isaacwiper","tag-threat-intelligence","tag-ukraine"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18542"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18542\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18542"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}