|
| 1 | +name: Potential ClickFix infection chain via Run window |
| 2 | +id: ffe1fc54-2893-4760-ab50-51a83bd71d13 |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Identifies the execution of the process via the Run command dialog box followed by spawning of the potential |
| 6 | + infostealer process. |
| 7 | + This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing |
| 8 | + malicious commands under the guise of meeting pages or CAPTCHAs. |
| 9 | +labels: |
| 10 | + tactic.id: TA0001 |
| 11 | + tactic.name: Initial Access |
| 12 | + tactic.ref: https://attack.mitre.org/tactics/TA0001/ |
| 13 | + technique.id: T1566 |
| 14 | + technique.name: Phishing |
| 15 | + technique.ref: https://attack.mitre.org/techniques/T1566/ |
| 16 | +references: |
| 17 | + - https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/ |
| 18 | + - https://blog.sekoia.io/clickfix-tactic-revenge-of-detection/ |
| 19 | + - https://detect.fyi/hunting-clickfix-initial-access-techniques-8c1b38d5ef9b |
| 20 | + |
| 21 | +condition: > |
| 22 | + sequence |
| 23 | + maxspan 2m |
| 24 | + |spawn_process and ps.name ~= 'explorer.exe' and length(ps.child.args) >= 2 |
| 25 | + and |
| 26 | + (thread.callstack.summary imatches |
| 27 | + ( |
| 28 | + 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*', |
| 29 | + 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|user32.dll|shell32.dll|explorer.exe|SHCore.dll|*' |
| 30 | + ) |
| 31 | + or |
| 32 | + (thread.callstack.summary imatches '*shell32.dll|explorer.exe|*' and thread.callstack.symbols imatches ('*shell32.dll!GetFileNameFromBrowse*')) |
| 33 | + ) |
| 34 | + | by ps.child.uuid |
| 35 | + |spawn_process and not ps.child.exe imatches |
| 36 | + ( |
| 37 | + '?:\\Program Files\\*.exe', |
| 38 | + '?:\\Program Files (x86)\\*.exe', |
| 39 | + '?:\\Windows\\System32\\*.exe' |
| 40 | + ) |
| 41 | + | by ps.uuid |
| 42 | +action: |
| 43 | + - name: kill |
| 44 | + |
| 45 | +output: > |
| 46 | + Potential infostealer process %2.ps.child.exe executed via the Run command window by %1.ps.child.cmdline |
| 47 | +severity: high |
| 48 | + |
| 49 | +min-engine-version: 2.2.0 |
0 commit comments