⭕embedded OLE + LNK objects
Last updated
Last updated
attackers embed .lnk files into the Office documents and camouflage them with Ms Word office icons in order to deceive victims to click and run them
Creating an .LNK file that will trigger the payload once executed:
Powershell payload will trigger a rudimentary NC reverse shell:
Once the above powershell script is executed, an .LNK
shortcut is created
Let's create a Word document that will contain the malicious shortcut that was created in the previous step:
Let's insert a new object into the document by selecting a Package
and changing its icon source to a Microsoft Word executable:
Point the package to the .lnk file containing the payload:
Final result:
Victim executing the embedded document. Gets presented with a popup to confirm execution:
Once the victim confirms they want to open the file - the reverse shell comes back to the attacker: