Once we download the files, inside is contained a .lnk
file called trick_or_treat.lnk
.
A .lnk
file is a Windows shortcut, also known as a link or alias, that points to and opens another file, folder, or application. It contains metadata about the target object, including its type, location, and filename.
Key characteristics:
- A
.lnk
file is a separate entity from the actual file or folder it references. - When double-clicked, it opens the target file or folder, rather than displaying its contents.
.lnk
files can be created by right-clicking on an object and selecting โCreate shortcutโ.- They are used to provide a convenient way to access frequently used files or applications.
So we can try to find something inside with strings command:
The malicious file employs PowerShell to execute commands within the system.
WindowStyle hidden
: Runs the PowerShell window in hidden mode, meaning the user wonโt see a command prompt or PowerShell window pop up.NoExit
: This prevents the PowerShell window from closing immediately after executing the command, which is helpful for ongoing processes but wonโt be visible in this case due to -WindowStyle hidden.Command
: This specifies the PowerShell command to be executed.[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($fko));
: This line decodes the Base64 string into human-readable text. When decoded, the string reveals a PowerShell command.
So we can decode it from base64: