Shortcut Modification
The end user usually uses some form of shortcuts or links to run apps or access files/folders. these shortcuts can be modified to run attackers payload instead.
From attackers point of view these files are actually .lnk
files stored in the Desktop directory for each user:
we can't edit these files like a normal text file. we can use this VBA script to edit these files:
this script will take the putty.lnk file (a link to putty executable file) from the desktop and modifies it to change the target path to run another VBA script that will run both the original putty.exe binary and the attacker payload.
Detection
check all desktop links and shortcuts to make sure they are not modified.
Last updated