T1547.009

Shortcut Modification

Adversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts (.lnk files) or symbolic links are used to reference other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process. Adversaries may abuse shortcuts in the startup folder to execute their tools and achieve persistence. They may also edit the target path or entirely replace existing shortcuts so their malware executes instead of the intended legitimate program. Threat actors including Lazarus Group, APT39, Leviathan, and Turla have used this technique. LNK browser extensions may also be modified to persistently launch malware.

Microsoft Sentinel / Defender
kusto
DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName endswith ".lnk"
| where FolderPath has_any ("Start Menu\\Programs\\Startup", "Start Menu\\Programs\\StartUp")
   or ActionType == "FileModified" and FolderPath has "Start Menu"
| project Timestamp, DeviceName, ActionType, FileName, FolderPath, SHA256,
         InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName
| sort by Timestamp desc
high severity high confidence

Data Sources

File: File Creation File: File Modification Microsoft Defender for Endpoint

Required Tables

DeviceFileEvents

False Positives

  • Software installations that create legitimate startup shortcuts (VPN clients, communication tools)
  • User-created shortcuts pinned to the Start Menu or placed in Startup folder intentionally
  • Windows Updates or application updates that recreate or modify existing shortcuts
  • Enterprise deployment tools (SCCM, Intune) deploying shortcuts during provisioning

Unlock Pro Content

Get the full detection package for T1547.009 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections