# LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities **[trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html](https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html)** July 25, 2022 In June 2022, LockBit revealed version 3.0 of its ransomware. In this blog entry, we discuss the findings from our own technical analysis of this variant and its behaviors, many of which are similar to those of the BlackMatter ransomware. By: Ivan Nicole Chavez, Byron Gelera, Katherine Casona, Nathaniel Morales, Ieriz Nicolle Gonzalez, Nathaniel Gregory Ragasa July 25, 2022 Read time: ( words) In March 2022, less than a year after [LockBit 2.0 first emerged, researchers caught wind of an upcoming new](https://www.trendmicro.com/en_us/research/21/h/lockbit-resurfaces-with-version-2-0-ransomware-detections-in-chi.html) variant of the [LockBit](https://www.trendmicro.com/vinfo/tmr/?/us/security/news/ransomware-spotlight/ransomware-spotlight-lockbit) [ransomware.](https://www.trendmicro.com/vinfo/tmr/?/us/security/definition/ransomware) [LockBit 3.0, aka](https://twitter.com/vxunderground/status/1541156954214727685) [“LockBit Black,” wouldn’t be unveiled until late June, coinciding](https://twitter.com/vxunderground/status/1528801206923141122) with the launch of the group’s new leak site and bug bounty program. A researcher has since shared a sample of LockBit 3.0, along with his initial analysis of the new variant. Using the packer identifier utility Detect It Easy, we found that this particular LockBit 3.0 sample is a Win32 .exe file [with multiple sections packed with an unknown packer (Figure 1). According to the original source of the sample, the](https://twitter.com/WhichbufferArda/status/1544339062089084928) malware uses this argument for execution: _{04830965-76E6-6A9A-8EE1-6AF7499C1D08}.exe -k LocalServiceNetworkRestricted -pass_ _db66023ab2abcb9957fb01ed50cdfa6a_ The LockBit 3.0 sample then drops an .ico file with the same file name as the one appended to the encrypted files in the %PROGRAMDATA% folder (Figure 2). ----- Figure 1. The file properties of LockBit 3.0 ----- Figure 2. The .ico file in the %PROGRAMDATA% folder As part of its encryption process, LockBit 3.0 appends the extension HLJkNskOq (Figure 3) and changes the icons of encrypted files to that of the aforementioned .ico file. Figure 3. The encrypted files with new file names and extensions, along with LockBit’s ransom note The ransomware then drops its ransom note (Figure 4), which references “Ilon Musk” and the European Union’s General Data Protection Regulation (GDPR). Lastly, it changes the wallpaper of the victim’s machine to inform them of the ransomware attack (Figure 5). ----- contents of LockBit 3.0’s ransom note 3.0 ## Similarities to BlackMatter ransomware Figure 4. The Figure 5. The desktop wallpaper applied by LockBit Researchers have pointed out that portions of LockBit 3.0’s code seem to be borrowed from the BlackMatter ransomware, hence the nickname LockBit Black. Likewise, we found similarities between BlackMatter and the new [LockBit variant during our debugging of the LockBit 3.0 sample. From our examination of the unpacked sample and](https://twitter.com/cPeterr/status/1543692271186579459) [an analysis provided by the researcher Chuong Dong we discovered that LockBit 3 0 requires a pass parameter to](https://chuongdong.com/reverse%20engineering/2021/09/05/BlackMatterRansomware/) ----- decrypt its main routine (Figure 6). Other ransomware families like Egregor have been observed exhibiting this same behavior, where an argument is required to proceed with the routine. This makes the binary harder to reverse if the parameter is not available. Figure 6. Decrypting sections using a -pass argument LockBit 3.0 performs API harvesting by hashing the API names of a DLL, and then comparing it to the list of the APIs that the ransomware needs (Figure 7). This routine is identical to that of BlackMatter (Figure 8), as the externally available script for renaming BlackMatter’s APIs also works for LockBit 3.0 (Figures 9 and 10). Figure 7. LockBit 3.0’s routine for API harvesting ----- harvesting APIs Figure 8. BlackMatter’s routine for API Figure 9. The XOR key LockBit 3.0 uses for renaming Figure 10. The XOR key BlackMatter uses for renaming APIs Instead of directly calling the addresses of the harvested APIs, LockBit 3.0 implements a trampoline pointer (Figure 11) to go to an allocated heap that contains a disassembly code that will then jump to the API address of the _NtTerminateProcess API (Figure 12). The code contained in the heap is randomly chosen from this set of codes:_ ROR by random number ROL by random number XOR to key ROR by random number, then XOR to key ROL by random number, then XOR to key ----- LockBit 3.0’s trampoline pointer code Figure 11. Figure 12. LockBit 3.0’s trampoline call to the NtTerminateProcess API LockBit 3.0 and BlackMatter also implement the same antidebugging technique: Both set the thread information to _ThreadHideFromDebugger (0x11) via the NtSetThreadInformation API (Figure 13) to cause any debuggers to crash_ if a breakpoint is placed on this thread. ----- Figure 13. ThreadHideFromDebugger via NtSetThreatInformation Like BlackMatter, LockBit 3.0 employs threading when using an API instead of directly calling an API, which is likely an attempt to make it more difficult for researchers to analyze. The strings it uses are decrypted using a simple bitwise-XOR routine (Figure 14), a bitwise-XOR and NOT routine (Figure 15), or a decryption routine involving a linear congruential generator (LCG) algorithm to generate a pseudorandom key (Figure 16). This is also similar to how BlackMatter operates, except for the addition of the bitwise-XOR and NOT routine. Figure 14. LockBit 3.0’s bitwise-XOR routine for string decryption Figure 15. LockBit 3.0’s bitwise-XOR and NOT for string decryption Figure 16. LockBit’s 3.0 string decryption using an LCG algorithm LockBit 3.0’s configurations (Table 1) are decrypted using the same XOR routine and keys obtained from an LCG pseudorandom number generator, and then decompressed using a compression library called APLib. **Configuration** **Description** PUB_KEY[0x80] RSA public key ----- VICT_ID[0x10] Victim ID (This is based on BlackMatter’s code, but is not used by LockBit 3.0.) AES_KEY[0x10] AES_KEY for the command-and-control (C&C) server (This is based on BlackMatter’s code, but is not used by LockBit 3.0.) FLAGS[0x18] Flags for specific routines OFFSET_ARRAY Array of the offset of Base64-encoded strings from this address (The length of the array is equal to the first value.) BASE64_STRING Array of Base64-encoded strings, which includes: Hashes of folders, files, and extensions to avoid Hashes of computer names to avoid Services and processes to kill A list of C&C servers Admin credentials The ransom note Table 1. A list of LockBit 3.0’s configurations LockBit 3.0 also checks the victim machine’s UI language to avoid infecting machines with these languages: Arabic (Syria) Armenian (Armenia) Azerbaijani (Cyrillic Azerbaijan) Azerbaijani (Latin Azerbaijan) Belarusian (Belarus) Georgian (Georgia) Kazakh (Kazakhstan) Kyrgyz (Kyrgyzstan) Romanian (Moldova) Russian (Moldova) Russian (Russia) Tajik (Cyrillic Tajikistan) Turkmen (Turkmenistan) Tatar (Russia) Ukranian (Ukraine) Uzbek (Cyrillic Uzbekistan) Uzbek (Latin Uzbekistan) LockBit 3.0 also retains these BlackMatter routines for privilege escalation: Uses UACMe’s method of bypassing user account control (UAC), which is to use the ICMLuaUtil COM interface under dllhost.exe Duplicates the Explorer.exe token for its own use Performs a 32-bit or 64-bit shellcode injection to elevate its token The string that both LockBit 3.0 and BlackMatter use as the encrypted file name extension, ransom note name, and wallpaper and icon name is a Base64-encoded hash (Figure 17). However, a key difference between the two pieces of ransomware is that LockBit 3.0 opts to use an RSA public key embedded in its configuration and hash it with ----- MD5, whereas BlackMatter uses a MachineGUID hashed using the same algorithm for APIs. This makes the string similar for all machines infected by the same sample, which is likely an attempt by LockBit’s operators to make it easier for them to identify which RSA private key pair is needed for an encrypted file. Figure 17. The string generation for BlackMatter (left) and LockBit 3.0 (right) Like BlackMatter, LockBit 3.0 also performs these routines: Attempts to log in using credentials from its configuration list to determine if the compromised system is a part of the domain admin that it will use for later routines Terminates and deletes processes and services from its configuration list, a routine similar to that of BlackMatter Wipes the recyle bin folder of every drive Checks a list of computer name hashes to avoid from its configuration list Connects to the C&C server from its configuration list if the flag is set Encrypts network shares and Exchange Mailbox if set in its configuration flag Obtains a list of files, folders, and extensions to be avoided from its configuration list Uses pointed files when encrypting .lnk files Prints the ransom note on any available printers and modifies the desktop wallpaper Uses the same encryption algorithm as BlackMatter LockBit 3.0’s deletion of shadow copies (Figure 18) is clearly lifted from BlackMatter’s code, as this is performed using Windows Management Instrumentation (WMI) through COM objects, as opposed to LockBit 2.0’s use of _vssadmin.exe._ ----- Figure 18. LockBit 3.0’s deletion of shadow copies via WMI This latest LockBit iteration performs some routines only if a specific argument is provided. LockBit 3.0 accepts only the arguments listed in Table 2, while BlackMatter accepts only the -safe, -wall, and -path arguments. **Argument** **Description** -pass {value} Uses the first 32 characters of the value as a key to decrypt the main routine (This is required for the ransomware to execute properly.) -safe Reboots in SafeBoot -wall Only sets the ransomware wallpaper and prints the ransom note on printers -path {target} Specifically encrypts the target, which can be a file or folder -gspd Performs group policy modification for lateral movement -psex Performs lateral movement via admin shares -gdel Deletes group policy updates -del Deletes itself Table 2. A list of arguments that LockBit 3.0 accepts The new LockBit variant checks arguments using hashing and based on the code. It’s designed to perform only one routine from the arguments except for -pass, which needs to be performed before the other arguments can be checked. The routines to print the ransom note and change the victim machine’s wallpaper is also similar to BlackMatter’s routines if the -wall argument is provided. Like BlackMatter, LockBit 3.0 can also restart in safe mode and execute via the RunOnce registry, as long as the -safe argument is provided. ----- However, there is one key difference between their configuration flags: BlackMatter has only nine flags while LockBit 3.0 has 24, as detailed in Table 3. **Configuration flag** **Description** ENCRYPT_LARGE_FILE­_FLAG If set, a large file will be included in the encryption routine. RANDOM_FILE NAME_FLAG If set, encrypted files will be renamed to random file names. ATTEMPT_LOGON_FLAG If set, a login attempt will be made using credentials from LockBit 3.0’s configuration list, and the credentials will be saved if these have domain admin rights. EXCLUDE_HIDDEN_FLAG If set, hidden files will not be encrypted. CHECK_UI_LANGUAGE_FLAG If set, the victim machine’s UI language will be checked and the ransomware will terminate if the machine is from any of the avoided countries. MOUNT_VOL_ENC_EXCHANGE_SERVER_FLAG If set, all volumes for encryption will be mounted and available exchange servers will be encrypted. ENC_SHARED_FLAG If set, shared folders will be encrypted. TERMINATE_PROCESS_FLAG If set, processes from LockBit 3.0’s configuration list will be terminated. DELETE_SERVICE_FLAG If set, services from LockBit 3.0’s configuration list will be deleted. CREATE_MUTEX_FLAG If set, a check will be done to see whether mutex is already created and the ransomware will terminate if it is. PRINT_RANSOM_NOTE_FLAG If set, the ransom note will be printed on available printers. CHANGE_WALLPAPER_FLAG If set, the victim’s wallpaper will be changed. CHANGE_ICON_FLAG If set, the icons of encrypted files will be changed. CONNECT_TO_CNC_FLAG If set, communication will be done with a C&C server from LockBit 3.0’s configuration list. DELETE_SELF_FLAG If set, the ransomware will delete itself using a dropped .tmp file. DELETE_AV_SERVICE_FLAG If set, AV services matching the hashes will be terminated. ----- CREATE_TEMP_MAX_DISKSPACE If set, another .tmp file (from the same .tmp file used in _DELETE_SELF_FLAG flag) will be created on each drive_ with random contents and sizes based on DiskFreeSpace. HAS_ADMIN_CRED_FLAG If set, an attempt will be made to use admin credentials obtained from the ATTEMPT_LOGON_FLAG flag. RUN_AS_ADMIN_FLAG If set, commands will be executed as admin using credentials from the ATTEMPT_LOGON_FLAG flag. FORCE_GPUPDATE_VIA_POWERSHELL_FLAG If set, group policy updates will be forced on all active directories using a PowerShell command. DELETE_TEMP_FLAG If set, the same .tmp file used in the DELETE_SELF_FLAG flag will be deleted via MoveFileExW and the victim machine will be restarted. DISABLE_EVENTLOG_FLAG If set, EventLog will be disabled via registry and service. DELETE_GPO_FLAG If set and the -gspd parameter is used, the victim machine’s sleep time will be set to 1 minute before performing routines that will delete group policy updates. UNUSED_FLAG An extra flag that’s not used in the analyzed binary (or possibly an indicator of the end of flags). Table 3. The flags that can be set in LockBit 3.0’s configuration One notable behavior for this third LockBit version is its file deletion technique: Instead of using cmd.exe to execute a batch file or command that will perform the deletion, it drops and executes a .tmp file decrypted from the binary. It has, however, retained some of LockBit 2.0’s features, like the earlier version’s ability for lateral movement through a group policy update, as long as there is a -gspd parameter provided. The executed .tmp file overwrites the contents of the ransomware binary and then renames the binary multiple times (Figure 19), with the new file names based on the length of the original file name. For example, a file named 1.exe, which has five characters (including the file name extension), is renamed as AAAAA, and then BBBBB, up to ZZZZZ. After renaming the file, LockBit 3.0 finally deletes it (Figure 20). This routine is probably the LockBit ransomware group’s attempt to avoid recovery by forensic tools and cover their tracks by completely removing any trace of the ransomware. ----- 19. LockBit 3.0 renaming the ransomware file multiple times 20. LockBit 3.0 deleting the ransomware file after renaming it repeatedly ## LockBit 3.0 on VirusTotal Figure Figure [A researcher recently spotted another LockBit 3.0 sample on VirusTotal (Figure 21), with 19 detections at the time of](https://twitter.com/petrovic082/status/1549626142142898177) this writing. This specific sample is a PowerShell script containing two layers of obfuscated code (Figures 22 and 23). After deobfuscating the script (Figure 24), we found that LockBit 3.0 is capable of injecting a DLL into memory via reflective loading (Figure 25), using code that is identical to BlackMatter’s own PowerShell code (Figure 26). Figure 21. A LockBit 3.0 sample found on VirusTotal as of July 21, 2022 Figure 22. The first layer of LockBit 3.0’s obfuscated code ----- Figure 23. The second layer of LockBit 3.0’s obfuscated code Figure 24. LockBit 3.0’s deobfuscated PowerShell script Figure 25. LockBit 3.0’s main function Figure 26. BlackMatter’s main function This particular sample has a payload that is compressed and encrypted via Base64 (Figure 27). To access it, we modified the script to dump the payload instead of executing it (Figure 28). By dumping the payload, we were able to obtain LockBit 3.0’s main binary (Figure 29). When it is executed, the script exhibits the same behavior as the previously discovered LockBit 3.0 sample. This specific sample appends 19MqZqZ0s to the file names of encrypted files (Figure 30). ----- Figure 27. LockBit 3.0’s payload Figure 28. Dumping LockBit 3.0’s payload ----- Figure 29. LockBit 3.0’s main binary Figure 30. LockBit 3.0’s encrypted files with 19MqZqZ0s appended to their names The payload of this specific LockBit 3.0 sample checks for only three hashed arguments (Figure 31), while the previous LockBit 3.0 sample checks for eight. Its DLL payload is reflectively loaded, and the codes of its propagation routine via admin shares and group policy are designed for PE (Portable Executable) binaries, not for a PowerShell ----- script, which might explain why some of the routines don t work. Another possibility is that LockBit 3.0 s ransomware builder might have the option to disable certain routines. This LockBit 3.0 sample with the PowerShell script doesn’t need a pass “key” to run even if there is a check for the -pass argument, although the rest of its routines are the same as those in the abovementioned sample with a Win32 .exe file. Figure 31. The hashed arguments in the LockBit 3.0 sample with a PowerShell script ## Locking out ransomware attacks [The LockBit ransomware gang led the ransomware-as-a-service (Raas) scene in the first quarter of 2022, with 220](https://www.trendmicro.com/vinfo/tmr/?/us/security/news/ransomware-by-the-numbers/lockbit-conti-and-blackcat-lead-pack-amid-rise-in-active-raas-and-extortion-groups-ransomware-in-q1-2022) self-reported successful RaaS and extortion attacks. One headline-making attack reportedly took place in January, [during which LockBit operators claimed to have breached France’s Ministry of Justice. It would be no surprise if](https://www.politico.eu/article/infamous-ransomware-group-claims-it-hacked-frances-justice-ministry/#:~:text=An%20infamous%20cybercriminal%20group%20said,on%20a%20data%20leak%20site.) some of BlackMatter’s affiliates had joined the ranks of the LockBit group, considering LockBit’s recent rise in notoriety, which would explain the many similarities between the two pieces of ransomware. With the release of this latest variant — and the launch of LockBit’s bug bounty program, which rewards its affiliates — we expect the LockBit ransomware group to be even more active in the coming days. We advise organizations and end users to be wary of this new variant, especially since the bug bounty program might help the operators in making their ransomware an even more formidable one. Best practices for mitigating the risk of a ransomware attack include: Following the 3-2-1 rule, which involves backing up files in three copies in two different formats, with one copy stored off-site. This is a precautionary measure to avoid data loss in case of a ransomware attack. [Remaining vigilant against socially engineered emails to reduce the risk of a ransomware infection, as](https://www.trendmicro.com/vinfo/tmr/?/us/security/definition/social-engineering) ransomware is commonly spread through malicious spam email attachments. [Keeping applications and programs up to date. Regular patching ensures that software vulnerabilities that](https://www.trendmicro.com/vinfo/tmr/?/us/security/news/security-technology/security-101-virtual-patching) ransomware actors could exploit as entry points can be addressed in a timely fashion. Organizations can benefit from a multilayered approach that can help guard possible entry points into a system (endpoint, email, web, and network). Trend Micro offers a suite of security solutions that can detect malicious [components and suspicious behavior, and improve an enterprise’s security posture. Trend Micro Vision One™](https://www.trendmicro.com/en_us/business/products/detection-response.html) provides multilayered protection and behavior detection, which helps block suspicious behavior early in a system [before a ransomware infection can do irreversible damage. Trend Micro™ Deep Discovery™ Email Inspector uses](https://www.trendmicro.com/en_us/business/products/user-protection/sps/email-and-collaboration/email-inspector.html) custom sandboxing and advanced analysis techniques to block malicious emails, including phishing emails that are common entry points for ransomware. Additionally, [Trend Micro Apex One™ offers automated threat detection and](https://www.trendmicro.com/en_us/business/products/user-protection/sps/endpoint.html) response to protect endpoints from more advanced concerns such as fileless threats and ransomware. ## Indicators of compromise (IOCs) ----- **SHA-256** **Detection name** 80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce Ransom.Win32.LOCKBIT.YXCGD a56b41a6023f828cccaaef470874571d169fdb8f683a75edd430fbd31a2c3f6e Ransom.Win32.LOCKBIT.YXCGFT d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee Ransom.Win32.LOCKBIT.YXCGD 506f3b12853375a1fbbf85c82ddf13341cf941c5acd4a39a51d6addf145a7a51 Ransom.Win32.LOCKBIT.YXCGKT c597c75c6b6b283e3b5c8caeee095d60902e7396536444b59513677a94667ff8 Ransom.PS1.LOCKBIT.YXCGTT 917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2 Ransom.Win32.LOCKBIT.YXCGT -----