Hybrid LockBit Sample Showing Worm-Like Network Enumeration Behavior


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-12-04 08:22:40 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
yqb1u6zl.exe
Type
Win32 Executable MS Visual C++ (generic)
SHA‑1
5a9c67a7eb803b3a2daa83449899769ce9011a6c
MD5
f5ec96b3d9560d7f1946531857960619
First Seen
2025-12-01 14:09:01.077419
Last Analysis
2025-12-01 21:28:47.076209
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 7+ hours, this malware remained undetected — a several-hour window that allowed the adversary to complete initial compromise and begin early-stage persistence establishment.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-11-13 09:45:09 UTC First VirusTotal submission
2025-12-03 21:11:25 UTC Latest analysis snapshot 20 days, 11 hours, 26 minutes
2025-12-04 08:22:40 UTC Report generation time 20 days, 22 hours, 37 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 73. Detected as malicious: 64. Missed: 9. Coverage: 87.7%.

Detected Vendors

  • Xcitium
  • +63 additional vendors (names not provided)

List includes Xcitium plus an additional 63 vendors per the provided summary.

Missed Vendors

  • Acronis
  • Baidu
  • CMC
  • google_safebrowsing
  • MaxSecure
  • SUPERAntiSpyware
  • TACHYON
  • VirIT
  • Yandex

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

Intensive file system activity (47.37% of behavior) indicates data harvesting, file encryption, or dropper behavior. The threat is actively searching for and manipulating files across the system.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
File System 150781 47.37%
Synchronization 144452 45.38%
System 10134 3.18%
Registry 8146 2.56%
Network 2534 0.80%
Threading 684 0.21%
Com 540 0.17%
Process 438 0.14%
Device 338 0.11%
Misc 107 0.03%
Services 106 0.03%
Hooking 14 0.00%
Windows 11 0.00%
Crypto 4 0.00%

MITRE ATT&CK Mapping

  • T1007 – query service status
  • T1564.003 – hide graphical window
  • T1027 – encode data using XOR
  • T1027.005 – contain obfuscated stackstrings
  • T1543.003 – stop service
  • T1489 – stop service
  • T1033 – get token membership
  • T1083 – enumerate files recursively
  • T1082 – get disk information
  • T1129 – link many functions at runtime
  • T1027 – encrypt data using AES
  • T1082 – get disk size
  • T1027 – reference AES constants
  • T1622 – hide thread from debugger
  • T1129 – parse PE header
  • T1135 – enumerate network shares
  • T1112 – delete registry value
  • T1007 – enumerate services
  • T1012 – query or enumerate registry value
  • T1027 – encode data using Base64 via WinAPI
  • T1614.001 – identify system language via API
  • T1129 – link function at runtime on Windows
  • T1082 – check OS version
  • T1027 – encrypt data using AES via x86 extensions
  • T1057 – enumerate processes
  • T1518 – enumerate processes
  • T1083 – check if file exists
  • T1016 – get local IPv4 addresses
  • T1548.002 – bypass UAC via ICMLuaUtil
  • T1016 – get socket status
  • T1222 – set file attributes
  • T1083 – enumerate files on Windows
  • T1059 – accept command line arguments
  • T1082 – enumerate disk volumes
  • T1083 – get common file path
  • T1497.001 – reference anti-VM strings targeting VMWare

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
www.msftncsi.com 23.200.3.7 United States Akamai Technologies, Inc.
www.aieov.com 13.248.169.48 United States Amazon Technologies Inc.

Observed IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
www.msftncsi.com A
5isohu.com A
101.56.168.192.in-addr.arpa PTR
12.56.168.192.in-addr.arpa PTR
7.56.168.192.in-addr.arpa PTR
14.56.168.192.in-addr.arpa PTR
www.aieov.com A

Contacted IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
5355 18 udp
53 24 udp
3702 1 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.11 192.168.56.255 137 137 3.4663641452789307 udp
192.168.56.11 224.0.0.252 49563 5355 3.390960216522217 udp
192.168.56.11 224.0.0.252 51628 5355 33.835875034332275 udp
192.168.56.11 224.0.0.252 51880 5355 38.549068212509155 udp
192.168.56.11 224.0.0.252 53480 5355 38.7047700881958 udp
192.168.56.11 224.0.0.252 54650 5355 3.4081711769104004 udp
192.168.56.11 224.0.0.252 54684 5355 41.35685706138611 udp
192.168.56.11 224.0.0.252 55601 5355 4.662480115890503 udp
192.168.56.11 224.0.0.252 56473 5355 33.789576053619385 udp
192.168.56.11 224.0.0.252 56666 5355 38.70466208457947 udp
192.168.56.11 224.0.0.252 58090 5355 41.2085120677948 udp
192.168.56.11 224.0.0.252 60054 5355 41.208418130874634 udp
192.168.56.11 224.0.0.252 60205 5355 3.417659044265747 udp
192.168.56.11 224.0.0.252 60334 5355 33.88307309150696 udp
192.168.56.11 224.0.0.252 61507 5355 33.88321113586426 udp
192.168.56.11 224.0.0.252 62120 5355 34.43670105934143 udp
192.168.56.11 224.0.0.252 62798 5355 6.5878400802612305 udp
192.168.56.11 224.0.0.252 63550 5355 38.372886180877686 udp
192.168.56.11 224.0.0.252 64563 5355 41.66886615753174 udp
192.168.56.11 239.255.255.250 62184 3702 3.4137661457061768 udp
192.168.56.11 8.8.4.4 50586 53 81.18001317977905 udp
192.168.56.11 8.8.4.4 51663 53 37.3692741394043 udp
192.168.56.11 8.8.4.4 51690 53 7.335035085678101 udp
192.168.56.11 8.8.4.4 51899 53 6.5880091190338135 udp
192.168.56.11 8.8.4.4 52464 53 52.11715006828308 udp
192.168.56.11 8.8.4.4 55183 53 99.80446600914001 udp
192.168.56.11 8.8.4.4 56213 53 22.83627700805664 udp
192.168.56.11 8.8.4.4 58800 53 66.6639130115509 udp
192.168.56.11 8.8.4.4 58917 53 22.93014621734619 udp
192.168.56.11 8.8.4.4 59770 53 22.883177042007446 udp
192.168.56.11 8.8.4.4 62329 53 22.883154153823853 udp
192.168.56.11 8.8.4.4 63439 53 22.78962206840515 udp
192.168.56.11 8.8.8.8 50586 53 80.18007707595825 udp
192.168.56.11 8.8.8.8 51663 53 36.3685359954834 udp
192.168.56.11 8.8.8.8 51690 53 8.320576190948486 udp
192.168.56.11 8.8.8.8 51899 53 7.586173057556152 udp
192.168.56.11 8.8.8.8 52464 53 51.11735415458679 udp
192.168.56.11 8.8.8.8 55183 53 98.81210803985596 udp
192.168.56.11 8.8.8.8 56213 53 21.8359591960907 udp
192.168.56.11 8.8.8.8 58800 53 65.66994619369507 udp
192.168.56.11 8.8.8.8 58917 53 21.929509162902832 udp
192.168.56.11 8.8.8.8 59770 53 21.883225202560425 udp
192.168.56.11 8.8.8.8 62329 53 21.88324999809265 udp
192.168.56.11 8.8.8.8 63439 53 21.79019021987915 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

1

Registry Set

13

Services Started

0

Services Opened

0

Registry Opened (Top 25)

Key
HKEY_CURRENT_USER\Software\LockBit
Show all (1 total)

Registry Set (Top 25)

Key Value
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VolSnap\Volume{853201e6-2d75-11ea-a138-806e6f6e6963}ComputeIgnorableProduct (Enter) 48 00 00 00 00 00 00 00 E0 74 A0 3B B1 F6 D9 01 00 00 00 00 00 00 00 00 0C 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VolSnap\Volume{853201e6-2d75-11ea-a138-806e6f6e6963}ComputeIgnorableProduct (Leave) 48 00 00 00 00 00 00 00 60 05 BD 3B B1 F6 D9 01 00 00 00 00 00 00 00 00 0D 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VolSnap\Volume{853201e6-2d75-11ea-a138-806e6f6e6963}DeleteProcess (Enter) 48 00 00 00 00 00 00 00 C0 66 BF 3B B1 F6 D9 01 00 00 00 00 00 00 00 00 12 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VolSnap\Volume{853201e6-2d75-11ea-a138-806e6f6e6963}DeleteProcess (Leave) 48 00 00 00 00 00 00 00 C0 66 BF 3B B1 F6 D9 01 00 00 00 00 00 00 00 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\LockBit\Public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
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\LockBit\full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
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 “%TEMP%\D97V6D4897UI8EWD.exe”
\\Registry\Machine\BCD00000000\Objects\{73f6dfe1-2d75-11ea-8605-9a0fd88c3b92}\Elements\16000009\Element
\\Registry\Machine\BCD00000000\Objects\{73f6dfe1-2d75-11ea-8605-9a0fd88c3b92}\Elements\250000e0\Element
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{1F97DF1C-B109-4218-B377-C2C0FB449974}\data
HKEY_CURRENT_USER\Software\LockBit\Public
HKEY_CURRENT_USER\Software\LockBit\full
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 “c:\analyse\1764636907.5963638_72c9b16b-2f21-4b15-b66f-c6bb8fe39369”

Services Started (Top 15)

Services Opened (Top 15)

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top