Technical Overview
Windows Shortcut files (LNK) are binary formatted files that point to another application. However, they allow for extensive argument passing. By directing an LNK file to a LOLBin (Living Off The Land Binary) like `cmd.exe` or `powershell.exe` with malicious arguments, code execution can be achieved simply by viewing the file icon or double-clicking it.
Key Mechanisms
- Argument Injection: Hiding command strings within the "Target" field (often padding with whitespace to hide from UI).
- Icon Masquerading: Using the vector's icon resource to mimic harmless files like PDF or Folder.
- Network Handshakes: UNC path injection can force NTLM authentication attempts.
SILENT