LockBit 3.0, also known as LockBit Black, demonstrates advanced anti-forensic and rapid encryption tactics, including log clearing, service deletion, and Windows Defender evasion. The campaign gains initial access via SMB brute-forcing from various IPs and uses PSEXEC to propagate laterally before encrypting shared drives with a unique per-target key. #LockBit #LockBitBlack #LockBit3 #PSEXEC #CMSTPLUA #WindowsDefender
Keypoints
- LockBit 3.0 (LockBit Black) exhibits heavy anti-forensic activity, including log clearing and service/process termination to erase traces.
- Initial access is achieved via SMB brute forcing from multiple IPs, enabling lateral movement within the victim network.
- The PSEXEC tool is used to run malicious BAT files, modify RDP/auth settings, and disable antivirus, facilitating network-wide deployment.
- Ransomware payloads require a per-target key (e.g., 60c14e91dc3375e4523be5067ed3b111) and encrypt files on shared drives with a unique extension (.zbzdbs59d).
- The malware decrypts PE sections in memory by deriving a 1-byte key from the provided argument, targeting TEXT, DATA, and PDATA sections.
- Obfuscated Win32 API resolution is performed by decrypting strings with XOR using a unique key (0x3A013FD5) per payload.
- Privilege escalation uses CMSTPLUA COM to bypass UAC, elevating to administrator rights for a second payload instance.
MITRE Techniques
- [T1110] Brute Force – The group obtains initial access to the victim’s network via SMB brute forcing from various IPs. “The group obtains initial access to the victim’s network via SMB brute forcing from various IPs.”
- [T1021.002] SMB/Windows Admin Shares – PSEXEC is used to spread laterally and execute the ransomware payload across the network. “The sys-internal tool PSEXEC is used to execute malicious BAT files on a single system which were later cleaned off. These files indicate activity related to modifying RDP & authentication settings while disabling antivirus at the same time.”
- [T1027] Deobfuscate/Decode Files or Information – Resolving obfuscated APIs by decrypting strings with a per-payload XOR key. “Being packed and having only a few imports, Win32 APIs are resolved by decrypting the obfuscated string with XOR using the key 0x3A013FD5, which is again unique to each payload.”
- [T1548.002] Pass-the-Through Privilege Escalation / UAC Bypass – Privilege escalation via CMSTPLUA COM to bypass the UAC prompt. “This elevates the rights from the user to the administrator level with another instance of the ransomware payload, terminating the current process.”
- [T1562.001] Impair Defenses – Disabling Windows Defender for evasion. “Specifically, Windows Defender is disabled for evasion.”
- [T1070.001] Clear Windows Event Logs – Anti-forensic activity includes disabling event logs by registry changes. “As part of wiping out its traces, lots of anti-forensic activity is observed where Windows Event Logs are disabled by setting multiple registry subkeys to value 0.”
- [T1053.005] Scheduled Task/Job – Tasks are enumerated and deleted to hinder detection. “Scheduled tasks are enumerated and deleted, some of which are shown below.”
- [T1486] Data Encrypted for Impact – File encryption across shares using multi-threading and per-file naming. “Files are encrypted by creating multiple threads where each filename is replaced with a random string generated and appending the extension to them.”
- [T1490] Inhibit System Recovery – Shadow copies are deleted to prevent restoration. “Volume shadow copies are enumerated using a WMI query and then deleted to prevent system restoration.”
- [T1112] Modify Registry – Registry changes disable defenses and alter system settings. “Windows Event Logs are disabled by setting multiple registry subkeys to value 0.”
Indicators of Compromise
- [MD5] context – 7E37F198C71A81AF5384C480520EE36E – Ransom.Lockbit3.S28401281, HEUR:Ransom.Win32.InP
- [IP] context – 3.220.57.224, 72.26.218.86, and other IPs mentioned in the article
- [Domain] context – Jumpsecuritybusiness[.]com
- [Filename] context – zbzdbs59d.README.txt
- [Mutex] context – 13fd9a89b0eede26272934728b390e06
- [Extension] context – .zbzdbs59d (encrypted file extension)
Read more: https://blogs.quickheal.com/uncovering-lockbit-blacks-attack-chain-and-anti-forensic-activity/