IOC

Stage

Filename (7z.exe)

Collection

FTP to Russian geolocated IP from compromised system

Command and Control

Network Connections (IP)

User Agent Strings

Command interpreter (Plink.exe)

Anydesk Usage (IP)

Remote admin tool (AnyDeskMSI.exe)

Tools (Action1, Atera, anydesk, fixme it, screenconnect, splashtop, zoho assist)

Domain (eu1-dms.zoho[.]eu, fixme[.]it, unattended.techninline[.]net)

Filename (c:\perflogs\lsass.dmp)

Credential Access

Filename (c:\users\ \downloads\mimikatz.exe)

Filename (c:\users\ \desktop\proc64\proc.exe)

Group Policy Artifacts: NetworkShares.xml

Defense Evasion

Registry.pol

Safe Mode Launch Commands

Group Policy Artifacts: Services.xml

Service Killed

Filename (c:\users\ \downloads\processhacker2\peview.exe)

Filename (c:\users\ \music\processhacker2\processhacker.exe)

Filename (c:\perflogs\processhacker.exe)

Registry Artifacts: Disable and Clear Windows Event Logs

LockBit Command Line Parameters: -del (Self-delete)

LockBit Command Line Parameters: -pass (32 character value) (Required) Password used to launch LockBit 3.0.

Tool Download (IP and filename)

Network scanning software (Netscan.exe)

Discovery

Filename (tniwinagent.exe)

PowerShell script (123.ps1)

Execution

Force GPUpdate

Filename (psexesvc.exe)

Mutual Exclusion Object (Mutex) Created

Filename (c:\windows\temp\screenconnect\23.8.5.8707\files\azure.msi)

Exfiltration

Volume Shadow Copy Deletion

Impact

LockBit Command Line Parameters: -path (File or path) Only encrypts provided file or folder.

Lockbit 3.0 Ransom Note

LockBit 3.0 Black Icon (and also registry artifacts)

LockBit 3.0 Wallpaper (and also registry artifacts)

LockBit Command Line Parameters: -wall (Sets LockBit 3.0 Wallpaper and prints out LockBit 3.0 ransom note)

Volume Shadow Copy Deletion

Group Policy Artifacts: Services.xml

Service Killed

Processes Killed

Suspicious Email Activity

Initial Access

LockBit Command Line Parameters: -gspd (Spread laterally via group policy) & -psex (Spread laterally via admin shares)

Lateral Movement

Splashtop utility (SRUtility.exe)

LockBit Command Line Parameters: -safe (Reboot host into Safe Mode)

Persistence

Registry Artifacts: Enable Automatic Logon

Ransom Locations

Scheduled task: \MEGA\MEGAcmd

Scheduled task: UpdateAdobeTask

Mag.dll

UAC Bypass Via Elevated COM Interface

Privilege Escalation

LockBit Command Line Parameters: -safe (Reboot host into Safe Mode)

Registry Artifacts: Enable Automatic Logon

LockBit Command Line Parameters: -gdel (Remove LockBit 3.0 group policy changes)

Group Policy Artifacts: NetworkShares.xml

Force GPUpdate

Ransom Locations