Windows LNK files (shortcuts) are small files pointing to executables, scripts, or directories. Attackers abuse LNK files to execute malicious payloads silently, either when a user interacts with the shortcut or automatically via startup locations
An LNK file (Windows shortcut) is a small file that points to another file, folder, or program. These are commonly used to create desktop shortcuts, allowing users to quickly open applications without navigating to the actual file location. However, attackers can manipulate LNK files to execute malicious commands silently.
🛠Key Fields in LNK Files:
Dropping Malicious LNK Files in Startup Locations
LNK files placed in C:\\Users\\<User>\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\ execute automatically at login.
Example: A shortcut named Update.lnk that secretly runs:
powershell.exe -ExecutionPolicy Bypass -File C:\\malware.ps1
Modifying Legitimate Shortcuts
Append malicious commands to existing LNKs (e.g., Chrome, Word).
Example:
Original Target: "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe"
Modified Target: "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe && powershell.exe -exec bypass -file C:\\payload.ps1"
Embedding LNK Files in USB Drives or Network Shares
C:\\USBDrive\\hidden\\malware.vbs.Phishing or Drive-By Execution
mshta.exe or rundll32.exe.Example 1: Simple Malicious LNK