Phishing: OLE + LNK
Phishing, Initial Access using embedded OLE + LNK objects
Last updated
Phishing, Initial Access using embedded OLE + LNK objects
Last updated
This lab explores a popular phishing technique where attackers embed .lnk files into the Office documents and camouflage them with Ms Word office icons in order to deceive victims to click and run them.
Creating an .LNK file that will trigger the payload once executed:
Powershell payload will trigger a rudimentary NC reverse shell:
Once the above powershell script is executed, an .LNK
shortcut is created:
Let's create a Word document that will contain the malicious shortcut that was created in the previous step:
Let's insert a new object into the document by selecting a Package
and changing its icon source to a Microsoft Word executable:
Point the package to the .lnk file containing the payload:
Final result:
Victim executing the embedded document. Gets presented with a popup to confirm execution:
Once the victim confirms they want to open the file - the reverse shell comes back to the attacker:
After the payload is triggered, the process ancestry looks as expected - powershell gets spawned by winword, cmd is spawned by powershell..:
Soon after, the powershell gets killed and cmd.exe becomes an orphaned process:
Like in T1137: Phishing - Office Macros, you can use rudimentary tools on your Windows workstation to quickly triage the suspicious Office document. First off, rename the file to a .zip extension and unzip it. Then you can navigate to word\embeddings
and find oleObject.bin
file that contains the malicious .lnk
:
Then you can do a simple strings
or hexdump against the file and you should immediately see signs of something that should raise your eyebrow(s):
As an analyst, one should look for CLSID 00021401-0000-0000-c000-000000000046
in the .bin file, which signifies that the .doc contains an embnedded .lnk file. In our case this can be observed here: