Shortcut Modification
Adversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts (.lnk files) or symbolic links are used to reference other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process. Adversaries may abuse shortcuts in the startup folder to execute their tools and achieve persistence. They may also edit the target path or entirely replace existing shortcuts so their malware executes instead of the intended legitimate program. Threat actors including Lazarus Group, APT39, Leviathan, and Turla have used this technique. LNK browser extensions may also be modified to persistently launch malware.
DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName endswith ".lnk"
| where FolderPath has_any ("Start Menu\\Programs\\Startup", "Start Menu\\Programs\\StartUp")
or ActionType == "FileModified" and FolderPath has "Start Menu"
| project Timestamp, DeviceName, ActionType, FileName, FolderPath, SHA256,
InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Software installations that create legitimate startup shortcuts (VPN clients, communication tools)
- User-created shortcuts pinned to the Start Menu or placed in Startup folder intentionally
- Windows Updates or application updates that recreate or modify existing shortcuts
- Enterprise deployment tools (SCCM, Intune) deploying shortcuts during provisioning
Unlock Pro Content
Get the full detection package for T1547.009 including response playbook, investigation guide, and atomic red team tests.