Skip to content

Commit d87f913

Browse files
committed
feat(rules): Potential ClickFix infection via Run dialog
Identifies the execution of the process via the Run command dialog box followed by a network connection. This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing malicious commands under the guise of meeting pages or CAPTCHAs.
1 parent 328f7be commit d87f913

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
name: Potential ClickFix infection chain via Run window
2+
id: ffe1fc54-2893-4760-ab50-51a83bd71d13
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution of the process via the Run command dialog box followed by spawning of the potential
6+
infostealer process.
7+
This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing
8+
malicious commands under the guise of meeting pages or CAPTCHAs.
9+
labels:
10+
tactic.id: TA0001
11+
tactic.name: Initial Access
12+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
13+
technique.id: T1566
14+
technique.name: Phishing
15+
technique.ref: https://attack.mitre.org/techniques/T1566/
16+
references:
17+
- https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/
18+
- https://blog.sekoia.io/clickfix-tactic-revenge-of-detection/
19+
- https://detect.fyi/hunting-clickfix-initial-access-techniques-8c1b38d5ef9b
20+
21+
condition: >
22+
sequence
23+
maxspan 2m
24+
|spawn_process and ps.name ~= 'explorer.exe' and length(ps.child.args) >= 2
25+
and
26+
(thread.callstack.summary imatches
27+
(
28+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*',
29+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*'
30+
)
31+
or
32+
(thread.callstack.summary imatches '*shell32.dll|explorer.exe|*' and thread.callstack.symbols imatches ('*shell32.dll!GetFileNameFromBrowse*'))
33+
)
34+
| by ps.child.uuid
35+
|spawn_process and not ps.child.exe imatches
36+
(
37+
'?:\\Program Files\\*.exe',
38+
'?:\\Program Files (x86)\\*.exe',
39+
'?:\\Windows\\System32\\*.exe'
40+
)
41+
| by ps.uuid
42+
action:
43+
- name: kill
44+
45+
output: >
46+
Potential infostealer process %2.ps.child.exe executed via the Run command window by %1.ps.child.cmdline
47+
severity: high
48+
49+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)