Saturday, March 8, 2025
HomeCyber AttackHackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

Published on

SIEM as a Service

Follow Us on Google News

The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system downloads an LZH archive containing an LNK file, where executing this LNK file triggers a malware infection.

An infected website utilizes JavaScript to stealthily download malware onto user systems when specific accounts with Basic authentication credentials access it.

The malicious webpage displays a maintenance message while silently downloading an LZH file containing malware and also provides a link to download Lhaplus, a legitimate decompression tool, to encourage users to extract the malicious payload.

malicious code embedded in the tampered website 

It leverages an LNK file that contains Base64-encoded ZIP and VBS files and upon execution, the LNK file extracts these components.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

The VBS script then decodes and extracts the malicious ZIP archive, potentially leading to malware infection.

The legitimate iusb3mon.exe process loads the malicious dmiapi32.dll (SQRoot) in a new session named “newimp,” bypassing normal loading mechanisms.

Flow of malware infection

SQRoot malware utilizes a modular approach, downloading plugins from a command-and-control server to expand its capabilities, which include functionalities like downloading and executing Remote Access Trojans (RATs) and executing shellcode.

By employing ChaCha20 encryption, it communicates with the C2 server, while unique identifiers are embedded in the User-Agent header and a random string (aq[BASE64-encoded 12-byte nonce]) is included in the x-auth header for identification and authentication.

A part of the SQRoot RAT disguised as a BPM file

It is a tool that restricts communication between a malware client and its command and control (C2) server by enforcing a time window from 9:00 AM to 6:00 PM, Monday through Friday, to hinder malware operations during off-business hours. 

It does this by sending dummy traffic to the C2 server in order to conceal the actual interactions that are taking place with the server.

The downloaded plugin 8015ba282c.tmp triggers the download of SQRoot RAT, a malicious BPM file, which exhibits restricted C2 communication, operating only during weekdays between 9:00 AM and 6:00 PM.

Malicious code contained in the LNK file

SQRoot, a malicious program, injects itself into a legitimate file (nvSmart.exe) and then loads plugins (like jtpa_record_4_0.tmp, a keylogger) to steal information from the infected device.

According to JPCERT/CC, the attack leveraged a watering hole technique, deploying malware (nvSmart.exe, nvsmartmax.dll, iusb3mon.exe, iusb3mon.dll) previously associated with APT10. 

The website was compromised by the attackers using a Weevely web shell, which allowed for persistent remote access and most likely made it easier for the initial infection vector to be used.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...