Skip to content

Commit 6cebc6a

Browse files
committed
feat(rules): Potential ClickFix infection via Run dialog
Identifies the execution of the process via Run command dialog box followed by a network connection. This could be indicative of ClickFix deceptive tactic used by attackers to lure victims into executing malicious commands under the guise of meeting pages or CAPTCHAs.
1 parent 47564c2 commit 6cebc6a

1 file changed

Lines changed: 39 additions & 0 deletions

File tree

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
name: Potential ClickFix infection via Run dialog
2+
id: ffe1fc54-2893-4760-ab50-51a83bd71d13
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution of the process via Run command dialog box followed by a network connection.
6+
This could be indicative of ClickFix deceptive tactic used by attackers to lure victims into executing
7+
malicious commands under the guise of meeting pages or CAPTCHAs.
8+
labels:
9+
tactic.id: TA0001
10+
tactic.name: Initial Access
11+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
12+
technique.id: T1566
13+
technique.name: Phishing
14+
technique.ref: https://attack.mitre.org/techniques/T1566/
15+
references:
16+
- https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/
17+
- https://blog.sekoia.io/clickfix-tactic-revenge-of-detection/
18+
- https://detect.fyi/hunting-clickfix-initial-access-techniques-8c1b38d5ef9b
19+
20+
condition: >
21+
sequence
22+
maxspan 2m
23+
|spawn_process and ps.name ~= 'explorer.exe' and length(ps.child.args) >= 2
24+
and
25+
thread.callstack.summary imatches
26+
(
27+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
28+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*'
29+
)
30+
| by ps.child.uuid
31+
|connect_socket and not cidr_contains(net.dip, '127.0.0.0/8', '10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16')| by ps.uuid
32+
action:
33+
- name: kill
34+
35+
output: >
36+
Process %1.ps.child.exe executed via Run dialog and subsequently connected to the IP address %2.net.dip
37+
severity: high
38+
39+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)