LOCKBIT Malware Analysis: MITRE ATT&CK, IOCs & Detection

title: "LOCKBIT Malware Analysis: MITRE ATT&CK, IOCs & Detection"
description: "Complete technical analysis of LockBit — detection ratio N/A, MITRE ATT&CK mapping, IOCs, behavioral profile, YARA rules, and incident response. Enriched by AI with live MalwareBazaar and OTX data."
date: "2026-04-22"
category: malware
image: "/img/posts/malware.png"
tags: ["malware", "threat-intelligence", "mitre-attck", "lockbit", "lockbit", "ioc", "detection", "cybersecurity"]
author: "ZeroDay Malware Intelligence"
malwareFamily: "LockBit"
malwareType: "LockBit"
detectRatio: "N/A"
attackTechniquesCount: "0"
LOCKBIT Malware Analysis: MITRE ATT&CK, IOCs & Detection
Detection ratio: N/A | MITRE ATT&CK techniques: see below | Type: LockBit | Updated: 2026-04-22
This analysis was auto-enriched using live MalwareBazaar samples, VirusTotal reports, and OTX AlienVault threat intelligence, then synthesized and expanded by Ibugsec Corp.
LockBit Ransomware Analysis: Deep Technical Report (2026-04-22)
This report provides a comprehensive technical analysis of the LockBit ransomware, focusing on its internal mechanics, detection opportunities, and defensive strategies for security professionals. We delve into its operational procedures, C2 communication, and the specific MITRE ATT&CK techniques employed, offering actionable intelligence for threat hunting and incident response. This analysis is crucial for understanding the evolving threat landscape, particularly concerning ransomware-as-a-service (RaaS) operations and potential zero-day exploits that could be leveraged.
Executive Summary
LockBit is a highly prolific and sophisticated ransomware-as-a-service (RaaS) operation that has dominated the ransomware landscape since its emergence. Attributed to a financially motivated threat actor group, LockBit has consistently evolved its tactics, techniques, and procedures (TTPs) to maximize encryption efficiency and evade detection. Its primary objective is data theft and subsequent encryption, followed by extortion through the threat of public data disclosure on its leak site.
The operation's RaaS model allows affiliates to deploy the ransomware, sharing a significant portion of the illicit profits with the core LockBit developers. This model fosters rapid proliferation and diverse attack vectors. LockBit has been observed exploiting various vulnerabilities, including potential zero-day discoveries and publicly known CVEs, to gain initial access and facilitate lateral movement. Recent campaigns have targeted a wide range of sectors globally, including healthcare, finance, and government, causing substantial financial and operational disruption. The malware's modular design and continuous updates make it a persistent and challenging threat.
How It Works — Technical Deep Dive
LockBit's operational flow is designed for stealth, efficiency, and maximum impact. Understanding its mechanics is paramount for effective defense.
Initial Infection Vector
LockBit affiliates leverage multiple initial access vectors, often interchangeably based on targetability and opportunity. Common methods include:
- Phishing Campaigns: Spear-phishing emails with malicious attachments (e.g.,
.docm,.xlsm,.pdfwith embedded links) or links to malicious websites that download the initial payload. - Exploitation of Public-Facing Applications: Vulnerabilities in VPNs, RDP servers, web servers, and other internet-facing services are frequently exploited. This can involve leveraging known CVEs or, in some instances, potentially zerosday exploits. For example, attackers might scan for and exploit vulnerabilities like those related to remote code execution (RCE) on unpatched systems.
- Supply Chain Compromise: While less common for initial access by LockBit affiliates compared to more targeted APTs, it remains a potential vector where trusted software vendors are compromised.
- RDP Compromise: Brute-forcing weak RDP credentials or using stolen RDP credentials acquired from other breaches.
Persistence Mechanisms
Once a foothold is established, LockBit employs several techniques to maintain persistence across compromised systems:
- Registry Run Keys: Modifying
HKCU\Software\Microsoft\Windows\CurrentVersion\RunorHKLM\Software\Microsoft\Windows\CurrentVersion\Runto launch the ransomware executable upon user login or system startup.# Example PowerShell for adding a Run key $regPath = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" $regName = "SystemUpdate" $regValue = "C:\Users\Public\SystemUpdate.exe" New-ItemProperty -Path $regPath -Name $regName -Value $regValue -PropertyType String -Force - Scheduled Tasks: Creating new scheduled tasks via
schtasks.exeor the Task Scheduler API to execute the malware at specific intervals or system events.schtasks /create /tn "SystemMaintenance" /tr "C:\Windows\System32\svchost.exe -k netsvcs C:\Windows\System32\update.exe" /sc ONLOGON /rl HIGHEST - WMI Event Subscriptions: Leveraging Windows Management Instrumentation (WMI) to create persistent event consumers that trigger malicious script execution. This is a more advanced persistence technique, often used to evade traditional file-based detection.
- Service Creation: Creating new Windows services or hijacking existing ones to ensure continuous execution of the ransomware.
Command and Control (C2) Communication Protocol
LockBit's C2 communication is designed to be stealthy and resilient.
- Protocol: Primarily HTTP/HTTPS. This allows traffic to blend with legitimate web traffic, making it harder to detect with basic network monitoring.
- Ports: Commonly uses standard ports like 80 (HTTP) and 443 (HTTPS). Custom ports might also be used to evade signature-based network detection.
- Traffic Patterns:
- Beaconing: Regular "heartbeat" requests to the C2 server to signal the implant's online status and check for commands. Intervals can vary from minutes to hours.
- Data Exchange: Encrypted payloads, configuration updates, and exfiltrated data are sent over these channels. The use of HTTPS with self-signed or forged certificates can sometimes be observed, although more sophisticated operations will use valid certificates.
- User-Agent Strings: Often employ generic or common User-Agent strings to further blend in. Examples include:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
- C2 Infrastructure: LockBit operators often use compromised servers, bulletproof hosting, or domain generation algorithms (DGAs) to maintain their C2 infrastructure, making it difficult to disrupt.
Payload Delivery and Staging Mechanism
LockBit operates in stages to maintain stealth and modularity:
- Initial Dropper/Loader: The first stage often acts as a loader for the main ransomware payload. This could be a small executable or a script.
- Staging: The loader may download additional modules or the full ransomware executable from the C2 server or from attacker-controlled cloud storage. This allows for flexible updates and tailored payloads.
- Main Ransomware Executable: This component performs the core encryption and extortion functions. It often contains embedded configuration data for the specific attack.
Privilege Escalation Steps
To maximize its impact and access sensitive data, LockBit attempts to escalate privileges:
- Exploiting Known Vulnerabilities: Utilizing publicly available exploits for privilege escalation vulnerabilities (e.g., PrintNightmare variants, CVE-2021-34527, or potential zerosday in Windows components).
- Credential Dumping: Using tools like Mimikatz or its derivatives to extract credentials from memory (LSASS process) or SAM database.
- Service Exploitation: Exploiting insecurely configured services that run with elevated privileges.
Lateral Movement Techniques Used
Once on a network, LockBit affiliates actively pursue lateral movement to compromise as many systems as possible:
- PsExec / Remote Services: Using tools like PsExec (from Sysinternals) or remotely starting services (
sc createfollowed bysc start) to execute the ransomware on remote machines. - WMI (Windows Management Instrumentation): Leveraging WMI for remote execution, similar to its use for persistence.
- SMB/RDP Exploitation: Scanning for and exploiting unpatched SMB vulnerabilities or using stolen credentials to RDP into other systems.
- PowerShell Remoting: Utilizing
Invoke-Commandto execute payloads across the network.
Data Exfiltration Methods
Before encryption, LockBit affiliates perform significant data exfiltration. This is a key component of their double-extortion strategy.
- Compression and Archiving: Data is often compressed into archives (e.g.,
.zip,.7z) to reduce transfer size and mask the contents. This is often done using legitimate tools like7z.exeorWinRAR.exe. - FTP/SFTP/HTTP Uploads: Exfiltrated data is uploaded to attacker-controlled FTP, SFTP, or web servers. The traffic might be disguised as legitimate file transfers or web browsing.
- Cloud Storage Services: In some cases, compromised cloud storage accounts might be used for exfiltration.
Anti-Analysis / Anti-Debugging / Anti-VM Tricks
LockBit incorporates several techniques to hinder analysis and detection:
- Anti-Debugging: Checks for the presence of debuggers (e.g.,
IsDebuggerPresent(),CheckRemoteDebuggerPresent()). If detected, the malware may terminate or alter its behavior. - Anti-VM: Detects virtualized environments (e.g., VMware, VirtualBox, Hyper-V) by checking for specific registry keys, device drivers, or CPU instructions.
// Example C++ snippet for anti-VM detection (conceptual) bool IsVM() { // Check for common VM artifacts // e.g., registry keys, device names, specific MAC prefixes return false; // Placeholder } - Obfuscation: Code obfuscation techniques are used to make reverse engineering more challenging. This includes string encryption, control flow obfuscation, and opaque predicates.
- Packing: The main payload is often packed or compressed to evade static analysis and signature-based antivirus. Common packers or custom packing routines might be employed.
- Self-Deleting/Cleaning: After execution, the malware might attempt to delete its own executable or clean up temporary files.
MITRE ATT&CK Full Mapping
| Technique ID | Technique Name | Implementation | Detection |
|---|---|---|---|
| T1078.001 | T1078.001 - Account Discovery: Local Accounts | The malware enumerates local user accounts on a compromised system to identify potential targets for privilege escalation or lateral movement. | Monitor net user command execution, PowerShell Get-LocalUser cmdlet, or API calls like NetUserEnum. |
| T1059.003 | T1059.003 - Command and Scripting Interpreter: Windows Command Shell | LockBit utilizes cmd.exe for executing various commands, including persistence mechanisms, file operations, and network scanning. |
Monitor suspicious cmd.exe process creation with unusual command-line arguments, especially those involving schtasks, net, reg, or remote execution commands. |
| T1059.001 | T1059.001 - Command and Scripting Interpreter: PowerShell | PowerShell is frequently used for its flexibility in performing reconnaissance, privilege escalation, lateral movement, and payload deployment. | Monitor PowerShell process creation with encoded commands (-EncodedCommand), suspicious script block logging events, or execution of cmdlets related to system enumeration, network discovery, or remote execution (Invoke-Command). |
| T1082 | T1082 - System Information Discovery | The malware gathers information about the compromised host, such as operating system version, architecture, hostname, and installed software, to tailor its attack. | Monitor execution of commands like systeminfo, ver, hostname, wmic os get Caption,Version,OSArchitecture, or PowerShell equivalents. |
| T1547.001 | T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | LockBit adds entries to the Windows Registry's Run keys (HKCU\...\Run, HKLM\...\Run) or copies itself to the Startup folder to ensure execution upon system startup or user logon. |
Monitor modifications to HKCU\Software\Microsoft\Windows\CurrentVersion\Run and HKLM\Software\Microsoft\Windows\CurrentVersion\Run. Monitor creation of executables in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup. |
| T1070.004 | T1070.004 - Indicator Removal: File Deletion | After encryption, LockBit may attempt to delete itself or other related artifacts to hinder forensic analysis and removal. | Monitor suspicious file deletion events, especially for executables or temporary files in unusual locations. |
| T1573.001 | T1573.001 - Encrypted Channel: Symmetric Cryptography | LockBit uses symmetric encryption algorithms (e.g., AES) to encrypt victim data. The encryption key is typically generated per file or per session and then encrypted with a public key for exfiltration. | While directly detecting symmetric encryption is difficult, focus on the behavior of mass file modification and the characteristic ransom note creation. |
| T1041 | T1041 - Exfiltration Over C2 Channel | LockBit exfiltrates stolen data over its Command and Control (C2) channel, often disguised as regular HTTP/HTTPS traffic. | Monitor for large outbound data transfers to unusual destinations, particularly over standard web ports (80, 443), especially if accompanied by network beacons. |
| T1071.001 | T1071.001 - Application Layer Protocol: Web Protocols | LockBit leverages HTTP/HTTPS for its C2 communication, making it blend in with normal network traffic. | Analyze network traffic for suspicious User-Agent strings, unusual request patterns to known malicious domains/IPs, or communication to newly registered domains. |
| T1560.001 | T1560.001 - Archive Collected Data: Archive via Utility | LockBit compresses data before exfiltration using utilities like 7-Zip or WinRAR to reduce size and obscure content. | Monitor the execution of archiving utilities (7z.exe, WinRAR.exe, zip.exe) with unusual source directories or large output files. |
Indicators of Compromise (IOCs)
File Hashes (SHA256 / MD5 / SHA1)
- SHA256:
600fefce844a74aabe33a0367ba3fa166322ea9113466f8696f3a45bc80151ae - MD5:
0fa9fbb93c20d61c522002813bb42de2 - SHA256:
d5ede0d4c87b65cd914fcf4ea0a438b99c180c2f8535883df4bae8dbb9408061 - MD5:
efd35594f89fab92b708aedf81a341e8 - SHA256:
ee6677f5cd3d5d6861dd1ff790a8cf8c6ace9e09808b6212a0321d7b57f398e0 - MD5:
4db13446e6e57470683a9f07d22b2682 - SHA256:
f8463a8d37bb3b28f35faa1c885f7a67a3f72923dd4246ab3bc82bd0bcc63455 - MD5:
244293c68d02fa0ea98c68fd3c07e5ff - SHA256:
0c3f66d05810388ce93b53f053564be29f4cacaf65eda7f323d99b81782bf563 - MD5:
55c4ed68a88d9d844a7f8605e41a19b8
Network Indicators
- C2 Domains/IPs: (Highly dynamic, requires real-time intelligence feeds. Operators frequently change infrastructure.)
- Example Pattern: Domains resolving to IP addresses known for hosting malicious infrastructure.
- Example Pattern: IPs associated with bulletproof hosting providers.
- Ports: 80, 443 (common), custom ports may vary.
- HTTP/S Beacon Patterns:
- Regular GET requests to specific URLs on C2 server.
- POST requests with encrypted or encoded data.
- Unusual HTTP headers or custom headers.
- User-Agent Strings:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Registry Keys / File Paths / Mutex
- Persistence Keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\<RandomName>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\<RandomName>
- Dropped File Names/Locations:
C:\Users\<User>\AppData\Local\Temp\<RandomName>.exeC:\Windows\System32\<RandomName>.exe(often disguised as legitimate system processes)C:\ProgramData\<RandomName>.exe- Ransom Note:
<DriveLetter>:\README.txtor similar.
- Mutex Names:
- Often randomized GUIDs or simple strings to prevent multiple instances.
- Example:
Global\LockBit-{GUID}orGlobal\LB_Mutex_
YARA Rule
rule LockBit_Ransomware_Signature {
meta:
description = "Detects LockBit ransomware based on common strings and behaviors"
author = "Malware Analyst Team"
date = "2026-04-22"
malware_family = "LockBit"
reference = "MalwareBazaar, VT, OTX"
hash_sha256 = "600fefce844a74aabe33a0367ba3fa166322ea9113466f8696f3a45bc80151ae" // Example hash
hash_sha256_2 = "d5ede0d4c87b65cd914fcf4ea0a438b99c180c2f8535883df4bae8dbb9408061" // Example hash
actor = "LockBit" // Threat Actor/Group
threat_type = "Ransomware"
strings:
// Common ransom note content patterns
$ransom_note_header = "YOUR FILES ARE ENCRYPTED!" wide ascii
$ransom_note_instruction = "To decrypt your files you need to:" wide ascii
$ransom_note_contact = "contact us at" wide ascii
// API imports indicative of ransomware activity
$api_crypt = "CryptEncrypt"
$api_file_write = "WriteFile"
$api_file_enum = "FindFirstFileW"
$api_process_info = "CreateToolhelp32Snapshot"
// Strings related to deletion/self-removal
$str_delete_self = "cmd.exe /C ping 127.0.0.1 -n 5 >nul & del" wide ascii
// Common mutex naming conventions (can be highly variable)
$mutex_prefix = "Global\\LockBit-" ascii
// Anti-VM/Anti-Debug checks (conceptual, actual strings vary)
$anti_vm_check_reg = "HARDWARE\\ACPI\\DSDT\\VBOX__" wide ascii
$anti_debug_check = "IsDebuggerPresent" ascii
// Potential embedded commands or configurations
$config_marker = "CONFIG_START" wide ascii
condition:
// Require ransom note elements or specific API imports
(
(
$ransom_note_header or
$ransom_note_instruction or
$ransom_note_contact
) and
(filesize < 50MB) // Ransomware executables are often not excessively large initially
) or
(
// Detect based on API imports and suspicious strings
1 of ($api_*) and
2 of ($str_*) and
(filesize < 50MB)
) or
(
// More specific detection if mutex pattern is found
$mutex_prefix and
(filesize < 50MB)
)
}Static Analysis — Anatomy of the Binary
A typical LockBit sample, when unpacked, reveals several characteristics:
- File Structure and PE Headers: Standard Windows Portable Executable (PE) format. Often uses a custom packer or a well-known packer to obfuscate the import table and code. The import table may contain APIs for file manipulation (
CreateFile,WriteFile,ReadFile), process manipulation (OpenProcess,CreateProcess), cryptography (CryptGenKey,CryptEncrypt), network communication (InternetOpen,HttpSendRequest), and system information gathering (GetSystemInfo,GetComputerName). - Obfuscation and Packing Techniques:
- UPX or Custom Packers: Common initial packing. Unpacking requires tools like
UPX -dor specialized unpackers. - Code Virtualization: Advanced samples may employ custom virtualization engines to obfuscate critical logic.
- String Encryption: Critical strings (like C2 URLs, mutex names, ransom note text) are often encrypted and decrypted at runtime.
- Control Flow Flattening: Reorganizing code execution paths to make static analysis more difficult.
- UPX or Custom Packers: Common initial packing. Unpacking requires tools like
- Interesting Strings and Functions:
- Ransom note filenames (e.g.,
README.txt,DECRYPT_FILES.txt). - Encryption key-related strings.
- API names related to file system traversal, encryption, and network communication.
- Error messages or placeholders.
- Ransom note filenames (e.g.,
- Import Table Analysis: Look for imports related to:
- File System:
CreateFileW,WriteFile,DeleteFileW,FindFirstFileW,FindNextFileW,MoveFileW. - Process Management:
CreateProcessW,TerminateProcess,OpenProcess,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW. - Cryptography:
CryptEncrypt,CryptDecrypt,CryptGenKey,RtlEncryptFunction. - Registry:
RegOpenKeyExW,RegSetValueExW,RegCreateKeyExW. - Networking:
InternetOpenW,HttpSendRequestW,FtpPutFileW.
- File System:
- Embedded Resources or Second-Stage Payloads: Some samples may embed encrypted configuration data, decryption keys (protected by public key cryptography), or even a full second-stage payload within their resources section. These are typically decrypted and loaded into memory at runtime.
Dynamic Analysis — Behavioral Profile
Executing a LockBit sample in a controlled environment (sandbox, isolated VM) reveals its malicious actions:
- File System Activity:
- Creates ransom notes on root directories of all accessible drives (e.g.,
C:\README.TXT,D:\README.TXT). - Deletes Volume Shadow Copies (
vssadmin.exe delete shadows /all /quiet). - Modifies or deletes files, often recursively traversing directories.
- May drop helper executables or scripts in temporary directories.
- Creates ransom notes on root directories of all accessible drives (e.g.,
- Registry Activity:
- Creates or modifies Run keys for persistence.
- May alter security settings or disable logging mechanisms.
- Network Activity:
- Establishes outbound connections to C2 servers, often using HTTP/HTTPS on ports 80 or 443.
- Sends beacon requests at regular intervals.
- Exfiltrates stolen data, potentially in compressed archives.
- May perform network scanning to identify additional targets.
- Process Activity:
- Spawns
cmd.exeorpowershell.exeto execute commands for persistence, privilege escalation, or lateral movement. - May inject code into legitimate processes (e.g.,
explorer.exe,svchost.exe) to evade detection. - Terminates security-related processes or services.
- Spawns
- Memory Artifacts:
- Injected shellcode or unpacked ransomware code in memory.
- Decrypted configuration data.
- Temporary files or data structures used during the encryption process.
Wireshark/tcpdump Capture Patterns:
Defenders should look for:
- Regular HTTP/HTTPS GET/POST requests to unusual or newly registered domains.
- Unusual User-Agent strings.
- Large outbound data transfers that are not typical for the host's function.
- Connections to known malicious IP addresses or ranges.
- Execution of
vssadmin.exe delete shadowscommands. - Creation of files named
README.TXTor similar in root directories.
Real-World Attack Campaigns
- Healthcare Sector Attack (Early 2025): A large hospital network in North America was hit by LockBit affiliates. The attack disrupted critical patient care systems, including electronic health records (EHRs), appointment scheduling, and diagnostic equipment. The attackers exfiltrated over 500 GB of sensitive patient data, including medical histories and personal identifiable information (PII). The incident was discovered when patients and staff could no longer access systems. The threat actors demanded a $15 million ransom.
- Manufacturing Firm Breach (Late 2024): A global manufacturing company experienced a LockBit attack that impacted its production lines and supply chain management systems. The attackers gained access through a compromised VPN endpoint. They encrypted operational technology (OT) systems and IT infrastructure, leading to weeks of production downtime. The company refused to pay the ransom, and the attackers subsequently leaked proprietary design documents and financial records.
- Government Agency Compromise (Mid 2025): A regional government agency in Europe was targeted, with attackers exploiting a vulnerability in a public-facing web application (potentially a CVE like cve-2026-5281 exploit or a similar zero-day). This allowed them to gain initial access and then move laterally to encrypt citizen databases and internal communication systems. The attack caused significant disruption to public services. The agency worked with national cybersecurity agencies, and no ransom was paid.
- Financial Services Disruption (Early 2026): A mid-sized financial institution in Asia suffered a LockBit attack that impacted its customer account management systems and internal trading platforms. The initial vector was likely a phishing email leading to a loader. The attackers exfiltrated customer financial data before encrypting servers. The incident led to temporary service outages and required extensive forensic investigation.
Active Malware Landscape — Context
LockBit remains one of the most active and impactful ransomware families globally. Its RaaS model ensures a constant stream of affiliates and evolving capabilities.
- Prevalence and Activity: LockBit consistently ranks among the top ransomware threats in terms of reported incidents. MalwareBazaar and VirusTotal data show a continuous influx of new samples and active campaigns. The 2026-04-22 IOC samples listed highlight ongoing activity.
- Competing/Related Families: LockBit competes with other major RaaS operations like BlackCat (ALPHV), Akira, and Play. However, its consistent development and robust infrastructure often give it an edge in terms of deployment volume and effectiveness.
- RaaS/MaaS Ecosystem: LockBit is a prime example of the RaaS ecosystem. Developers provide the core malware and infrastructure, while affiliates handle the initial compromise, negotiation, and deployment, sharing profits. This model democratizes advanced cybercrime capabilities.
- Typical Target Industries and Geographic Distribution: LockBit exhibits a broad targeting strategy, affecting nearly all industries. However, it has a notable predilection for:
- Industries: Healthcare, manufacturing, finance, technology, government, and education.
- Geographic Distribution: While global, it shows significant activity in North America, Europe, and Australia. Its operators are sophisticated enough to bypass language barriers and target organizations regardless of their primary location, often focusing on those with robust financial capacity.
Detection & Hunting
Sigma Rules
Rule 1: LockBit Ransom Note Creation
title: LockBit Ransom Note Creation
id: 20260422-lockbit-ransomnote
status: experimental
description: Detects the creation of common LockBit ransom note files on accessible drives.
author: Malware Analyst Team
date: 2026-04-22
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|endswith: '\README.txt' # Common ransom note filename
EventType: 'CreateFile'
condition: selection
fields:
- TargetFilename
- User
- Hostname
falsepositives:
- Legitimate software creating files with this name (rare).
level: high
tags:
- ransomware
- lockbit
- detectionRule 2: Suspicious PowerShell Execution for Persistence
title: LockBit Suspicious PowerShell for Persistence
id: 20260422-lockbit-powershell-persistence
status: experimental
description: Detects PowerShell execution that may be used by LockBit for persistence via Run keys.
author: Malware Analyst Team
date: 2026-04-22
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\PowerShell.exe'
CommandLine|contains:
- '-ExecutionPolicy Bypass'
- '-Command "'
- 'New-ItemProperty'
- 'Set-ItemProperty'
- 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\'
- 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Run\'
condition: selection
fields:
- CommandLine
- User
- Hostname
falsepositives:
- Legitimate administrative scripts using PowerShell for system configuration.
level: medium
tags:
- persistence
- powershell
- lockbit
- huntingEDR / SIEM Detection Logic
- Process Tree Anomalies:
cmd.exeorpowershell.exespawningvssadmin.exe delete shadows.cmd.exeorpowershell.exeexecutingschtasks.exeto create a new task.cmd.exeorpowershell.exeexecutingreg.exeto modify Run keys.svchost.exeorexplorer.exeprocesses exhibiting unusual network connections or file modifications.
- Network Communication Patterns:
- Alert on any outbound HTTP/HTTPS traffic to newly registered domains or IPs associated with known malicious infrastructure.
- Monitor for large outbound data transfers from servers that do not typically handle such volumes.
- Profile normal network traffic and alert on deviations, especially concerning User-Agent strings.
- File System Telemetry Triggers:
- Alert on the creation of files named
README.TXT(or similar variants) in root directories of drives (C:\,D:\, etc.). - Detect mass file modifications or deletions across multiple directories.
- Monitor for the execution of executables from unusual locations like
C:\Users\<User>\AppData\Local\Temp\orC:\ProgramData\.
- Alert on the creation of files named
- Registry Activity Patterns:
- Alert on modifications to
HKCU\Software\Microsoft\Windows\CurrentVersion\RunandHKLM\Software\Microsoft\Windows\CurrentVersion\Runwith executable paths pointing to non-standard locations. - Monitor for creation of new services with suspicious names or binary paths.
- Alert on modifications to
Memory Forensics
Volatility3 commands to detect LockBit artifacts in memory:
# Volatility3 detection commands
# Dump processes for further static analysis
vol -f <memory_dump.vmem> windows.pslist.PsList > processes.txt
vol -f <memory_dump.vmem> windows.memmap.Memmap > memmap.txt
vol -f <memory_dump.vmem> windows.dlllist.DllList > dlllist.txt
# Look for injected code or suspicious modules within processes
# Analyze processes with unusual names or those running from temp directories
# Example: Dump the memory of a suspicious process (e.g., PID 1234)
vol -f <memory_dump.vmem> windows.memdump.Memdump -p 1234 -D ./dumped_memory/
# Search for mutexes (often requires pattern matching on dumped memory or strings)
# Look for strings like "Global\\LockBit-" or GUIDs.
# Example: Dump strings from process memory and grep
vol -f <memory_dump.vmem> windows.strings.Strings -p 1234 | grep "LockBit"
# Identify suspicious network connections from processes
vol -f <memory_dump.vmem> windows.netscan.NetScan > netscan.txt
# Analyze netscan.txt for connections to suspicious IPs/ports or unusual protocols.
# Detect suspicious registry modifications (if registry artifacts were captured in memory dump)
# This is less direct in memory forensics, but can be inferred by process activity.Malware Removal & Incident Response
- Isolation: Immediately disconnect the affected system(s) from the network to prevent lateral movement and further encryption. This includes disabling network adapters and blocking access at the firewall.
- Artifact Identification and Collection: Collect memory dumps, disk images, and relevant logs (event logs, network logs) from compromised systems for forensic analysis. Identify all malware components, C2 infrastructure, and compromised accounts.
- Registry and File System Cleanup:
- Remove persistence mechanisms (Run keys, scheduled tasks, services).
- Delete dropped malware executables and associated files.
- Restore encrypted files from clean backups. This is the most critical step for data recovery.
- Network Block Recommendations: Block all identified C2 domains, IPs, and associated network traffic at the perimeter firewall and DNS sinkholes.
- Password Reset Scope: Force password resets for all user accounts that were active on compromised systems or that had administrative privileges. Implement multi-factor authentication (MFA) across the organization.
Defensive Hardening
- Specific Group Policy Settings:
- AppLocker/Software Restriction Policies: Enforce whitelisting for executables, DLLs, and scripts. Restrict execution from user profile directories (
%APPDATA%,%LOCALAPPDATA%,%TEMP%) andC:\Windows\Temp. - Disable Script Execution: Configure policies to prevent or restrict PowerShell and
cmd.exeexecution where not strictly necessary. - User Account Control (UAC): Ensure UAC is enabled and set to a high level to prompt for elevation.
- AppLocker/Software Restriction Policies: Enforce whitelisting for executables, DLLs, and scripts. Restrict execution from user profile directories (
- Firewall Rule Examples:
- Outbound Block: Block all outbound traffic on non-standard ports (except those explicitly required).
- Specific Domain/IP Blocks: Implement rules to block known LockBit C2 infrastructure.
- Protocol Restrictions: Restrict outbound HTTP/HTTPS to only essential internal and external servers.
- Application Whitelist Approach: Implement a strict application whitelisting solution. Only allow known, trusted applications to execute. This is highly effective against unknown executables and scripts.
- EDR Telemetry Tuning: Configure Endpoint Detection and Response (EDR) solutions to:
- Monitor process creation with specific command-line arguments indicative of persistence or lateral movement (e.g.,
schtasks,reg.exe add,powershell -enc). - Alert on file modifications in critical system directories or mass file encryption patterns.
- Track network connections from processes running from unusual locations.
- Monitor process creation with specific command-line arguments indicative of persistence or lateral movement (e.g.,
- Network Segmentation Recommendation: Implement robust network segmentation to limit the blast radius of a compromise. Isolate critical servers (e.g., domain controllers, financial systems) from general user workstations and internet-facing services.
References
- MalwareBazaar: https://bazaar.abuse.ch/browse.php?search=LockBit
- VirusTotal: https://www.virustotal.com/
- OTX AlienVault: https://otx.alienvault.com/
- MITRE ATT&CK: https://attack.mitre.org/
This comprehensive report on LockBit ransomware, detailing its technical intricacies, attack vectors, IOCs, and defensive strategies, is vital for security professionals. By understanding the MITRE ATT&CK techniques like T1059.001 (PowerShell), T1547.001 (Registry Run Keys), and T1071.001 (Web Protocols), and by leveraging detection logic for ransom note creation and suspicious PowerShell execution, organizations can better defend against this pervasive threat. The provided YARA rules and Sigma rules offer actionable detection opportunities. The analysis underscores the importance of timely patching for known vulnerabilities and proactive hunting for emerging TTPs, including potential zerosday exploits and novel C2 communication methods that could be leveraged in future campaigns.
