Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Beyond PowerShell: Analyzing the Multi-Action ClickFix Variant

0
Medium
Published: Thu Apr 23 2026 (04/23/2026, 03:26:58 UTC)
Source: AlienVault OTX General

Description

This analysis documents a newly observed ClickFix variant that abuses native Windows utilities, specifically cmdkey and regsvr32, for payload delivery. Victims are socially engineered through fake CAPTCHA pages to execute a malicious command via the Windows Run dialog. The single command chains multiple actions: staging credentials using cmdkey, retrieving a remote DLL via regsvr32 from a UNC path, and executing it silently. The 64-bit DLL establishes persistence through a scheduled task pulled from a remote XML file hosted on attacker infrastructure. This approach avoids traditional malware drops and leverages exclusively trusted Windows components for high stealth. The variant demonstrates continued evolution of ClickFix techniques, moving beyond PowerShell to use command chaining with legitimate system tools.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/23/2026, 09:21:25 UTC

Technical Analysis

This ClickFix variant uses social engineering to trick victims into executing a single chained command via the Windows Run dialog. The command leverages cmdkey to stage credentials, then uses regsvr32 to fetch and silently execute a remote DLL from a UNC network path. The DLL is 64-bit and establishes persistence by creating a scheduled task based on a remote XML configuration hosted on attacker infrastructure. This approach avoids dropping traditional malware files on disk and relies exclusively on trusted Windows utilities (cmdkey, regsvr32, scheduled tasks) to evade detection. The campaign demonstrates an evolution from prior PowerShell-based ClickFix variants to a multi-action command chaining technique using legitimate system tools (living-off-the-land binaries). No known exploits in the wild or specific threat actors are identified. No patch or official remediation is indicated.

Potential Impact

The campaign enables attackers to execute arbitrary code on victim machines with high stealth by abusing trusted Windows utilities and avoiding traditional malware files. The chained command execution can lead to credential theft, remote DLL execution, and persistent access via scheduled tasks. This can facilitate further compromise and lateral movement within affected environments. The social engineering vector (fake CAPTCHA pages) targets user interaction to initiate the attack. No direct evidence of widespread exploitation or known active threat actors is reported.

Mitigation Recommendations

No official patch or vendor advisory is available for this campaign. Since the attack relies on social engineering to trick users into running commands via the Windows Run dialog, user awareness training to recognize and avoid fake CAPTCHA pages is critical. Restricting or monitoring the use of cmdkey and regsvr32, especially from untrusted sources or UNC paths, can help reduce risk. Implementing application control policies to limit execution of regsvr32 with remote DLLs and scheduled task creation from untrusted XML files may mitigate this threat. Patch status is not yet confirmed — check vendor advisories for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cyberproof.com/blog/beyond-powershell-analyzing-the-multi-action-clickfix-variant/"]
Adversary
null
Pulse Id
69e991829321a6135dcd0a13
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashb2d9a99de44a7cd8faf396d0482268369d14a315edaf18a36fa273ffd5500108
hashb2d9a99de44a7cd8faf396d0482268369d14a315edaf18a36fa273ffd5500108

Ip

ValueDescriptionCopy
ip151.245.195.142
CC=IR ASN=AS58224 iran telecommunication company pjs

Threat ID: 69e9e0fb87115cfb68ecdc87

Added to database: 4/23/2026, 9:06:03 AM

Last enriched: 4/23/2026, 9:21:25 AM

Last updated: 4/24/2026, 6:07:26 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses