Tuesday, January 28, 2025
Homecyber securityLockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

Published on

SIEM as a Service

Follow Us on Google News

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment.

The attack, which began with the execution of a malicious file posing as a Windows Media Configuration Utility, displayed a sophisticated playbook leveraging Cobalt Strike, advanced persistence mechanisms, lateral movement, data exfiltration tools, and an eventual ransomware payload.

Cobalt Strike Deployment

The attack commenced in January 2024 with a targeted phishing lure.

The victim downloaded and executed a malicious file (setup_wm.exe) mimicking the Windows Media Configuration Utility.

LockBit Ransomware
Initial Access

This file acted as a loader for a Cobalt Strike beacon, a prominent threat actor tool for post-exploitation, establishing an initial Command and Control (C2) connection.

Within 30 minutes, the attackers escalated their foothold, deploying discovery commands to identify domain controllers and leveraging elevated privileges of the compromised user.

The attackers installed two proxy tools, SystemBC and GhostSOCKS, on the domain controller.

While GhostSOCKS was detected and blocked by Windows Defender, SystemBC remained operational, enabling continued command and control communications.

Sophisticated persistence techniques were observed throughout the intrusion.

Scheduled tasks were widely deployed to trigger malicious binaries like SystemBC and GhostSOCKS.

Additionally, registry-based run keys ensured the automatic execution of payloads on user login.

To evade detection, the adversaries manipulated group policies to disable Windows Defender protections and employed process injection techniques to blend malicious activities into legitimate processes such as WUAUCLT.exe.

The attackers demonstrated advanced lateral movement capabilities. Using Remote Desktop Protocol (RDP), Windows Remote Management (WinRM), and SMB, they spread across the network, deploying secondary payloads on file servers and backup servers.

Notably, they leveraged tools such as Rclone for data exfiltration. Despite initial failed attempts to use FTP servers for exfiltration, the adversaries pivoted to Mega.io, achieving large-scale data transfers over 16 hours.

The attackers also accessed sensitive documents containing stored credentials and executed scripts like Veeam-Get-Creds.ps1 to extract backup software passwords.

They employed reconnaissance tools such as Seatbelt and SharpView to map the Active Directory environment and identify high-value targets.

LockBit Ransomware Deployment

After a 15-hour operational lull, the attackers shifted focus to their objective—ransomware deployment.

On the eleventh day, they staged the LockBit ransomware binary on a backup server and executed batch scripts to propagate the payload across all networked Windows hosts.

LockBit Ransomware
Deployement Batch Scripts

Tools like PsExec and WMI were used to distribute and execute the ransomware, while additional scripts disabled security mechanisms such as Windows Defender.

According to The DFIR Report, the deployment achieved complete encryption of targeted hosts within two hours.

Affected systems displayed a ransom note from LockBit, instructing victims to initiate negotiations.

This operation highlights the evolving sophistication of ransomware campaigns, where attackers integrate data exfiltration with ransomware deployment, amplifying the pressure on victims.

Key indicators of compromise (IoCs) in this intrusion include:

  • C2 Domains: compdatasystems.com, retailadvertisingservices.com
  • Proxy Tools: SystemBC and GhostSOCKS binaries
  • Data Exfiltration Tools: Rclone targeting Mega.io and FTP servers

The coordinated use of Cobalt Strike, persistence mechanisms, and advanced lateral movement tactics underscores the necessity of layered cybersecurity defenses.

Organizations are advised to implement active monitoring of scheduled tasks, registry changes, and network traffic, alongside regular patching and incident response simulations to mitigate such high-impact incidents.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own...

Microsoft Unveils Phishing Attack Protection for Teams Chat

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing...

Apple Security Update – Patch for iOS Zero-day, MacOS & More

Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own...

Microsoft Unveils Phishing Attack Protection for Teams Chat

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing...