Skip to content

Commit 81c4832

Browse files
committed
refactor(rules): Improve Potential ClickFix infection chain rule
1 parent 6c061fc commit 81c4832

1 file changed

Lines changed: 9 additions & 7 deletions

File tree

rules/initial_access_potential_clickfix_infection_chain_via_run_window.yml renamed to rules/initial_access_potential_clickfix_infection_chain.yml

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
name: Potential ClickFix infection chain via Run window
1+
name: Potential ClickFix infection chain
22
id: ffe1fc54-2893-4760-ab50-51a83bd71d13
3-
version: 1.0.5
3+
version: 2.0.0
44
description: |
5-
Identifies the execution of the process via the Run command dialog box followed by spawning of the potential
6-
infostealer process.
7-
This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing
5+
Identifies the execution of the process via the Run command dialog box, Windows Console shortuct, or Explorer address bar
6+
followed by spawning of the potential infostealer process.
7+
This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing
88
malicious commands under the guise of meeting pages or CAPTCHAs.
99
labels:
1010
tactic.id: TA0001
@@ -23,10 +23,12 @@ condition: >
2323
maxspan 2m
2424
|spawn_process and
2525
ps.parent.name ~= 'explorer.exe' and length(ps.args) >= 2 and
26+
ps.name iin ('cmd.exe', 'powershell.exe', 'pwsh.exe', 'wget.exe', 'curl.exe', 'msiexec.exe', 'mshta.exe', 'wscript.exe', 'cscript.exe', 'msbuild.exe') and
2627
(thread.callstack.summary imatches
2728
(
2829
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
29-
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*'
30+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
31+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|SHCore.dll|*'
3032
) or
3133
(thread.callstack.summary imatches '*shell32.dll|explorer.exe|*' and thread.callstack.symbols imatches ('*shell32.dll!GetFileNameFromBrowse*'))
3234
)
@@ -42,7 +44,7 @@ action:
4244
- name: kill
4345

4446
output: >
45-
Potential infostealer process %2.ps.exe executed via the Run command window by %1.ps.cmdline
47+
Potential infostealer process %2.ps.exe delivered via ClickFix infection chain
4648
severity: high
4749

4850
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)