heroui logo

Potential ClickFix Execution Pattern - Registry

Sigma Rules

View Source
Summary
The rule is designed to detect potential execution patterns associated with the ClickFix malware, which is often deployed through phishing campaigns. It focuses on monitoring specific registry modifications within the RunMRU keys, which are entries that track recently used commands via the Run dialog in Windows. Threat actors may leverage these entries to store HTTP/HTTPS links that lead to malicious resources. Notably, the ClickFix malware utilizes techniques such as clipboard hijacking and fake CAPTCHA pages to manipulate users into executing harmful payloads indirectly. In typical scenarios, users, prompted by a fake CAPTCHA, are tricked into pasting clipboard content (which may contain commands to download and execute remote scripts) into the Run dialog. The detection rule targets registry keys suggesting the presence of links, while also filtering for common words associated with malicious behavior and frequently used command-line tools. This dual-fold approach ensures effective detection of anomalous behaviors while minimizing false positives linked to legitimate software operations with HTTP links in the RunMRU.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2025-03-25