Posted in

New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection

A newly discovered variant of the ClickFix attack technique is actively targeting Windows users by abusing built-in system components to evade detection. Instead of relying on PowerShell or mshta, the attack leverages rundll32.exe and WebDAV to quietly deliver malicious payloads. 🚨

This change significantly reduces visibility for security tools focused on script-based threat detection.


Social Engineering Entry Point

The attack begins with a fake CAPTCHA verification page designed to trick users into executing commands manually.

Victims are instructed to:

  • Press Win + R to open Run dialog
  • Paste a pre-copied command
  • Execute it using Enter

Because the instructions appear harmless, users unknowingly initiate the attack themselves.


Abuse of Native Windows Components

This variant avoids common scripting engines and instead uses trusted Windows utilities.

The malicious chain:

  • Executes rundll32.exe
  • Connects to remote WebDAV share
  • Loads malicious DLL remotely
  • Executes export function using ordinal values

Using ordinal-based exports adds an additional obfuscation layer.


WebDAV-Based Payload Delivery

WebDAV allows remote files to be accessed as network resources.

The attacker uses this capability to:

  • Host malicious DLL externally
  • Load payload directly into memory
  • Avoid writing files to disk
  • Reduce detection footprints

This approach enables stealthy initial access.


Multi-Stage In-Memory Execution

After initial execution, the attack transitions to a multi-stage chain.

Later stages:

  • Invoke PowerShell quietly
  • Use in-memory payload delivery
  • Download additional components
  • Avoid filesystem artifacts

This technique minimizes forensic evidence.


Secondary Payload Capabilities

The attack deploys a loader that:

  • Resolves API calls dynamically
  • Avoids static imports
  • Uses hashing to obscure functions
  • Performs sandbox detection
  • Implements anti-debugging checks

These techniques complicate analysis and detection.


Process Injection for Persistence

Telemetry indicates code injection into legitimate applications.

Observed behaviors include:

  • Memory injection into browser processes
  • Hidden execution within trusted applications
  • Persistence through process hijacking
  • Reduced behavioral anomalies

This helps the malware remain concealed.


Detection Challenges

Because the attack uses legitimate tools, early detection is difficult.

Security teams may miss:

  • rundll32 execution anomalies
  • WebDAV traffic abuse
  • In-memory payload delivery
  • Minimal disk artifacts

Traditional script-based detection rules may not trigger.


Defensive Recommendations

Organizations should:

  • Monitor rundll32 command-line usage
  • Audit LOLBins activity
  • Restrict unnecessary WebDAV traffic
  • Block suspicious outbound connections
  • Enable command-line logging
  • Enhance user awareness training

These steps improve detection.


Conclusion

This ClickFix variant demonstrates a shift toward living-off-the-land techniques that rely on trusted Windows components. By combining social engineering, WebDAV payload delivery, and in-memory execution, attackers significantly reduce detection opportunities. Organizations should update monitoring strategies to include native tool abuse and user-driven execution scenarios.

Leave a Reply

Your email address will not be published. Required fields are marked *