Windows shortcuts (.lnk) can run specified program with given commandline, it use windows powershell and pass some command to it, for download and execute the executable .
In this exploit some tricks used for :
+ Hide the executed commandline from user, this mean if user use properties window of shortcut can’t see more than “C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe” but we have some extra code behind it to download and execute the payload .
+ 60th byte of the lnk file determine the window should show as normal, minimze or maxmize but for some unknown reason using it by standard API dose not apply to shorcut and i was forced to patch it by code .
For compiling the code you need to refrence to “Interop.IWshRuntimeLibrary.dll” and “IconExtractor.dll” assemblies .
How to Install IconExtractor.dll https://github.com/TsudaKageyu/IconExtractor:
– From the Tools menu, select Library Package Manager and then click Package Manager Console.
– Install-Package IconExtractor
How to Install Interop.IWshRuntimeLibrary.dll:
– right click Windows-Shortcut-Exploit project, add reference then browse to folder Windows-Shortcut-Exploit and find + INCLUDE Interop.IWshRuntimeLibrary.dll
Download : Windows-Shortcut-Exploit-master
Source : https://github.com/Fel0ny