Phishing, Initial Access using embedded OLE + LNK objects
This lab explores a popular phishing technique where attackers embed .lnk files into the Office documents and camouflage them with Ms Word office icons in order to deceive victims to click and run them.
Weaponization
Creating an .LNK file that will trigger the payload once executed:
After the payload is triggered, the process ancestry looks as expected - powershell gets spawned by winword, cmd is spawned by powershell..:
Soon after, the powershell gets killed and cmd.exe becomes an orphaned process:
Like in T1137: Phishing - Office Macros, you can use rudimentary tools on your Windows workstation to quickly triage the suspicious Office document. First off, rename the file to a .zip extension and unzip it. Then you can navigate to word\embeddings and find oleObject.bin file that contains the malicious .lnk:
Then you can do a simple strings or hexdump against the file and you should immediately see signs of something that should raise your eyebrow(s):
As an analyst, one should look for CLSID 00021401-0000-0000-c000-000000000046 in the .bin file, which signifies that the .doc contains an embnedded .lnk file. In our case this can be observed here: