
Summary
This detection rule focuses on identifying potentially harmful LNK (shortcut) files, which can be exploited to execute arbitrary commands or launch embedded executable content. The rule functions by recursively scanning files and archives, looking for files with the '.lnk' extension. Specifically, it checks inbound types and considers any attachments that are either LNK files directly or contained within common archive formats (like ZIP) that may also contain LNK files. The threat posed by LNK files is significant, especially in relation to malware and ransomware attacks, as they can initiate malicious payloads without user consent. The detection methods employed include thorough analysis of both individual files and compressed archive contents, allowing for comprehensive threat detection in various use cases.
Categories
- Endpoint
- Network
- Windows
Data Sources
- File
- Application Log
- Network Traffic
Created: 2022-04-25