1- name : Potential ClickFix infection chain via Run window
1+ name : Potential ClickFix infection chain
22id : ffe1fc54-2893-4760-ab50-51a83bd71d13
3- version : 1 .0.5
3+ version : 2 .0.0
44description : |
5- Identifies the execution of the process via the Run command dialog box followed by spawning of the potential
6- infostealer process.
7- This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing
5+ Identifies the execution of the process via the Run command dialog box, Windows Console shortuct, or Explorer address bar
6+ followed by spawning of the potential infostealer process.
7+ This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing
88 malicious commands under the guise of meeting pages or CAPTCHAs.
99labels :
1010 tactic.id : TA0001
@@ -23,10 +23,12 @@ condition: >
2323 maxspan 2m
2424 |spawn_process and
2525 ps.parent.name ~= 'explorer.exe' and length(ps.args) >= 2 and
26+ ps.name iin ('cmd.exe', 'powershell.exe', 'pwsh.exe', 'wget.exe', 'curl.exe', 'msiexec.exe', 'mshta.exe', 'wscript.exe', 'cscript.exe', 'msbuild.exe') and
2627 (thread.callstack.summary imatches
2728 (
2829 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
29- 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*'
30+ 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
31+ 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|SHCore.dll|*'
3032 ) or
3133 (thread.callstack.summary imatches '*shell32.dll|explorer.exe|*' and thread.callstack.symbols imatches ('*shell32.dll!GetFileNameFromBrowse*'))
3234 )
@@ -42,7 +44,7 @@ action:
4244 - name : kill
4345
4446output : >
45- Potential infostealer process %2.ps.exe executed via the Run command window by %1.ps.cmdline
47+ Potential infostealer process %2.ps.exe delivered via ClickFix infection chain
4648severity : high
4749
4850min-engine-version : 3.0.0
0 commit comments