Back to Intelligence

Defending Against Phorpiex: Detecting Malicious LNK Files in High-Volume Campaigns

SA
Security Arsenal Team
March 17, 2026
4 min read

Defending Against Phorpiex: Detecting Malicious LNK Files in High-Volume Campaigns

Introduction

The Phorpiex botnet, a long-standing threat in the cybercrime landscape, has resurfaced with a high-volume social engineering campaign. Unlike sophisticated exploitation of zero-day vulnerabilities, this attack relies on a simpler but effective vector: malicious Windows Shortcut (.lnk) files. By masquerading as legitimate invoices or documents, these shortcuts deliver malware capable of deploying ransomware payloads, including those associated with the "Global Group" threat actors. For defenders, this highlights the critical need for robust email filtering and endpoint detection, as human error remains a primary entry point for even well-known botnets.

Technical Analysis

The Threat Vector Phorpiex (also known as Trik) is utilizing a modular framework to distribute malicious payloads. In this specific campaign, the botnet spams targets with emails containing attachments disguised as documents (e.g., .pdf, .docx) but are actually .lnk files.

Execution Mechanism When a user double-clicks the malicious shortcut, it does not open a document. Instead, the .lnk file executes a command line instruction—typically invoking PowerShell or cmd.exe—to download and execute a second-stage payload from a remote server. This payload often drops a DLL or script that encrypts files on the local system and network shares.

Affected Systems

  • Operating Systems: All currently supported versions of Microsoft Windows (Windows 10, Windows 11, and Windows Server editions).
  • Severity: High. The payload leads to file encryption (ransomware) and potential data exfiltration.

Why It Is "Low-Noise" The attackers use standard system administration tools like PowerShell and standard file protocols (HTTP/FTP) for command and control (C2). This "living off the land" technique helps the malware blend in with normal administrative traffic, making detection based solely on network traffic anomalies difficult.

Defensive Monitoring

To defend against this campaign, security operations centers (SOC) should focus on detecting the execution chain initiated by Windows Explorer (explorer.exe) spawning suspicious child processes like PowerShell or Curl immediately after a user interaction.

KQL Queries for Microsoft Sentinel/Defender

Use the following KQL query to hunt for suspicious processes spawned by Explorer that match the Phorpiex behavior pattern (downloading artifacts via PowerShell):

Script / Code
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName == "explorer.exe"
| where ProcessFileName in ("powershell.exe", "cmd.exe", "curl.exe", "mshta.exe")
| where ProcessCommandLine has_any ("Invoke-WebRequest", "IEX", "DownloadString", "-enc", "-encodedcommand")
| project Timestamp, DeviceName, InitiatingProcessFileName, ProcessFileName, ProcessCommandLine, FolderPath
| order by Timestamp desc

PowerShell Script for LNK Triage

If an incident response team identifies a suspicious email attachment, they can use this PowerShell script to inspect the target path of a .lnk file without executing it. This helps verify if the shortcut points to a legitimate document or a malicious command.

Script / Code
<#
.SYNOPSIS
    Analyzes a .lnk file to extract its target path.
.DESCRIPTION
    This script uses the Shell.Application COM object to read the properties of a shortcut file
    to determine what it will actually execute.
#>

param(
    [Parameter(Mandatory=$true)]
    [string]$FilePath
)

if (-not (Test-Path $FilePath)) {
    Write-Error "File not found: $FilePath"
    exit
}

$shell = New-Object -ComObject WScript.Shell
$shortcut = $shell.CreateShortcut($FilePath)

Write-Host "Target Path:" $shortcut.TargetPath
Write-Host "Arguments:" $shortcut.Arguments
Write-Host "Working Directory:" $shortcut.WorkingDirectory
Write-Host "Description:" $shortcut.Description

# Cleanup
[System.Runtime.Interopservices.Marshal]::ReleaseComObject($shell) | Out-Null

Remediation

Organizations should take the following immediate steps to mitigate the risk of Phorpiex and similar LNK-based campaigns:

  1. Email Gateway Filtering: Configure secure email gateways (SEG) to block or sandbox all incoming email attachments with the .lnk extension. While shortcuts are common internally, they are rarely necessary in inbound email communications.

  2. Attack Surface Reduction (ASR) Rules: Enable the specific ASR rule in Microsoft Defender: "Block applications from creating child processes." While this requires tuning, it is highly effective against LNK files that attempt to spawn PowerShell or CMD immediately upon being opened. Alternatively, enable "Block Office applications from creating child processes" if the LNK masquerades as an Office document type.

  3. PowerShell Constrained Language Mode: For standard users, configure PowerShell to run in Constrained Language Mode. This prevents PowerShell from executing unapproved script blocks and API calls often used in these attacks.

  4. User Awareness Training: Immediately notify users of this specific campaign. Instruct them to verify the file extension of attachments before double-clicking. The icon of a .lnk file can be spoofed to look like a PDF, but the file type will remain "Shortcut".

  5. Patch and Update: Ensure endpoint detection and response (EDR) solutions are fully updated with the latest threat intelligence signatures to detect the Phorpiex DLLs and behavioral patterns.

Related Resources

Security Arsenal Incident Response Services AlertMonitor Platform Book a SOC Assessment incident-response Intel Hub

incident-responseransomwareforensicsphorpiexemail-securitymalwarewindowskql

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.