December 16, 2025 7 min read

ClickFix: DarkGate

Onkar R. Sonawane Lat61 Threat Intelligence Team
ClickFix: DarkGate

Introduction

“ClickFix” is a form of social engineering rather than an autonomous malware. It represents a fast-growing method of initial system compromise, where attackers deceive users into executing harmful commands themselves, typically disguised as routine troubleshooting steps or verification procedures ultimately leading to the unintentional installation of malware.

Key Symptoms of Infection

Since the user initiates the malicious command, traditional antivirus software may not immediately detect the initial action. However, once the payload is delivered, an infected system may exhibit symptoms such as:

  • Slow performance, freezing, or crashing
  • New or unexpected files or modified settings
  • Unauthorized software or toolbars appearing in your browser
  • Sudden redirection of web searches or a large volume of pop-up ads
  • Network activity communicating with command-and-control (C2) servers

As shown, the sample displays a message stating, The ‘Word Online’ extension is not installed in your browser. To view the document offline, click the ‘How to fix’ button.

Before proceeding with the button click, it’s important to review the underlying code. Upon inspection, multiple segments of base64-encoded content were identified.

A base64-encoded string was identified, which is processed using a reverse function likely as part of a concealment mechanism.

After applying the reverse operation and decoding the string, the resulting output is as follows:

After decoding the original Base64 value, we uncovered an additional layer of Base64-encoded data nested within it. Decoding this second string yielded the following output:

Malicious PowerShell Activity

A decoded PowerShell command was observed executing a multi-stage attack involving the download and execution of a malicious HTA (HTML Application) file. The script also included clipboard manipulation and session termination commands, indicating an attempt to evade detection and cover tracks.

  • Initial Action:
    The PowerShell script downloads an HTA file from the following URL: https://linktoxic34.com/wp-content/themes/twentytwentytwo/dark.hta
  • Local Save Path:
    The file is saved as:
    c:\users\public\nC.hta
  • Execution:
    The script uses Start-Process to launch the HTA file, initiating the malicious payload.
  •  Post-Execution Behaviour:

Clears clipboard contents using:
Set-Clipboard -Value ”

Ends the PowerShell session with:
exit

Further analysis of the HTML page revealed a JavaScript appended at the end of the code.

JavaScript-Based Payload Delivery Mechanism

A JavaScript snippet embedded at the end of the HTML page performs multiple coordinated actions:

  • Payload Decoding: 

Processes and reveals a hidden PowerShell script.

  • Modal Interaction:

Manages user interface elements to prompt action.

  • Clipboard Injection: 

Copies the decoded PowerShell command to the user’s clipboard upon clicking the “How to fix” button.

Clicking the button activates the script, which places a PowerShell command directly into the clipboard.

This command initiates the download and execution of a remote HTA file from:

  • https://linktoxic34.com/wp-content/themes/twentytwentytwo/dark.hta

The file is saved locally as:

  • c:\users\public\nC.hta

Once executed via Start-Process, the HTA file launches potentially harmful operations on the system. The attackers further employ social engineering by instructing users to press Windows+R to open the Run dialog, followed by CTRL+V to paste clipboard contents. This sequence is designed to prompt the execution of a PowerShell script previously copied to the clipboard without the user realizing its malicious intent. By leveraging familiar keyboard shortcuts, the attackers aim to lower suspicion and encourage unintentional script execution.

Upon completion of the user actions, the HTA file starts downloading.

Upon execution, the referenced file establishes a connection with the designated domain and triggers a PowerShell script hosted on that remote server. The following is the script retrieved and executed during this process.

Upon implicit execution of the PowerShell script, a directory is created on the C drive, into which an AutoIt executable and script are deployed and run automatically without user intervention.

Once the script.a3x AutoIt file is executed, it performs the following actions:

  • Creates a New Folder: A secondary directory is generated on the C drive, typically used to stage additional payloads or maintain persistence.
  • Drops Additional Components: Within this folder, the script may deploy further executables, configuration files, or scripts often part of a broader malware framework.
  • Automatic Execution: These components are launched without user interaction, continuing the attack chain silently.

Analysis of the file fckhffh.a3x reveals that it contains code implementing the DES (Data Encryption Standard) algorithm.

Execution of the fckhffh.a3x file results in the deployment of an DOS file onto the system.

Subsequently, DarkGate initiates its malicious operations and establishes communication with its command and control (C2) infrastructure.

Indicators of Compromise

File Name SHA-256
HTML File 1533221ca97e88f5010b4a8b4d392232034dd07f154b13d4413c19693c0304c3
Dark.hta ca628638c20f6a67ac80782dc872e1e06b84cda68accf5e912ade6645c689f04
PS File 40be7be16cdaa414898db0014d26afd9cf516ba209f074a95c346227e690acd4
.Zip File fab36431b9760b48eb84d671e7c10e16e0754ec86517d665c10811cd0670e06b
AutoIt Script File 4f5f733c7ca71d514991ac3b369e34ce1c3744ff604c88481522edced14cc22c

MITRE ATT&CK

Tactic Technique ID Description
Execution Command and Scripting Interpreter T1059.001 PowerShell used for in-memory execution
Defense Evasion Obfuscated Files or Information T1027 Base64 and reverse encoding used for concealment
Defense Evasion Masquerading T1036 HTA file disguised as a legitimate fix tool
Command & Control Application Layer Protocol: Web Traffic T1071.001 Payload retrieved over HTTP(S)
Impact Remote Access Tool T1219 Enables full control over infected systems

Prevention and Mitigation

  • User Awareness: Be extremely cautious of unexpected warnings or messages that prompt you to copy and paste code into a command prompt or terminal. Legitimate websites and applications will not ask you to do this.
  • Never Run Unfamiliar Code: Do not execute code from an untrusted source, even if it claims to “fix” an issue.
  • Use Reputable Security Software: Employ a strong antivirus/anti-malware program that uses behavioural analysis to detect unusual activity, not just known signatures.
  • Restrict Access: In enterprise environments, IT administrators can leverage Group Policy Objects (GPOs) to restrict or disable access to the Windows Run command (triggered by Win + R) and enforce controls that prevent users from executing unauthorized or potentially harmful programs from personal directories.
  • Disconnect if Affected: If you suspect you have fallen victim to a ClickFix attack, immediately disconnect the device from the internet and contact IT support.

Removal

  1. Reboot into Safe Mode with Networking
  2. Use UltraAV antivirus to delete malicious files.
  3. Detected as the following name by UltraAV:
  • Trojan.HTML.DarkGate.ORS

Conclusion

ClickFix social engineering tactic represents a sophisticated and technically refined approach to malware delivery. By embedding base64-encoded scripts within deceptive error messages, attackers lure users into executing a sequence of actions that ultimately trigger malicious PowerShell commands. These commands are designed to retrieve and launch payloads—such as HTA files—from remote servers, leading to the deployment of malware like DarkGate.

Once activated, the malware initiates a range of harmful operations, including exfiltrating sensitive user data to its command and control (C2) infrastructure. The execution flow is crafted to avoid detection and ensure persistence, employing techniques such as clearing clipboard history and launching processes in minimized windows. Through misleading prompts and seemingly helpful guidance, attackers manipulate users into unknowingly executing scripts that install and operate various malicious tools.

Keep reading