Introduction

“ClickFix” is a form of social engineering rather than an autonomous malware. It represents a fast-growing method of initial system compromise, where attackers deceive users into executing harmful commands themselves, typically disguised as routine troubleshooting steps or verification procedures ultimately leading to the unintentional installation of malware.

Key Symptoms of Infection

Since the user initiates the malicious command, traditional antivirus software may not immediately detect the initial action. However, once the payload is delivered, an infected system may exhibit symptoms such as: 

  • Slow performance, freezing, or crashing
  • New or unexpected files or modified settings
  • Unauthorized software or toolbars appearing in your browser
  • Sudden redirection of web searches or a large volume of pop-up ads
  • Network activity communicating with command-and-control (C2) servers

As shown, the sample displays a message stating, The ‘Word Online’ extension is not installed in your browser. To view the document offline, click the ‘How to fix’ button.

Before proceeding with the button click, it’s important to review the underlying code. Upon inspection, multiple segments of base64-encoded content were identified. 

A base64-encoded string was identified, which is processed using a reverse function likely as part of a concealment mechanism.

After applying the reverse operation and decoding the string, the resulting output is as follows:

After decoding the original Base64 value, we uncovered an additional layer of Base64-encoded data nested within it. Decoding this second string yielded the following output:

Malicious PowerShell Activity

A decoded PowerShell command was observed executing a multi-stage attack involving the download and execution of a malicious HTA (HTML Application) file. The script also included clipboard manipulation and session termination commands, indicating an attempt to evade detection and cover tracks.

  • Initial Action:
    The PowerShell script downloads an HTA file from the following URL: https://linktoxic34.com/wp-content/themes/twentytwentytwo/dark.hta
  • Local Save Path:
    The file is saved as:
    c:\users\public\nC.hta
  • Execution:
    The script uses Start-Process to launch the HTA file, initiating the malicious payload.
  •  Post-Execution Behaviour:

Clears clipboard contents using:
Set-Clipboard -Value ”

Ends the PowerShell session with:
exit

Further analysis of the HTML page revealed a JavaScript appended at the end of the code.

JavaScript-Based Payload Delivery Mechanism

A JavaScript snippet embedded at the end of the HTML page performs multiple coordinated actions:

  • Payload Decoding: 

Processes and reveals a hidden PowerShell script.

  • Modal Interaction: 

Manages user interface elements to prompt action.

  • Clipboard Injection: 

Copies the decoded PowerShell command to the user’s clipboard upon clicking the “How to fix” button.

Clicking the button activates the script, which places a PowerShell command directly into the clipboard. 

This command initiates the download and execution of a remote HTA file from:

  • https://linktoxic34.com/wp-content/themes/twentytwentytwo/dark.hta

The file is saved locally as:

  • c:\users\public\nC.hta

Once executed via Start-Process, the HTA file launches potentially harmful operations on the system. The attackers further employ social engineering by instructing users to press Windows+R to open the Run dialog, followed by CTRL+V to paste clipboard contents. This sequence is designed to prompt the execution of a PowerShell script previously copied to the clipboard without the user realizing its malicious intent. By leveraging familiar keyboard shortcuts, the attackers aim to lower suspicion and encourage unintentional script execution.

Upon completion of the user actions, the HTA file starts downloading.

Upon execution, the referenced file establishes a connection with the designated domain and triggers a PowerShell script hosted on that remote server. The following is the script retrieved and executed during this process.

Upon implicit execution of the PowerShell script, a directory is created on the C drive, into which an AutoIt executable and script are deployed and run automatically without user intervention.

Once the script.a3x AutoIt file is executed, it performs the following actions:

  • Creates a New Folder: A secondary directory is generated on the C drive, typically used to stage additional payloads or maintain persistence.
  • Drops Additional Components: Within this folder, the script may deploy further executables, configuration files, or scripts often part of a broader malware framework.
  • Automatic Execution: These components are launched without user interaction, continuing the attack chain silently.

Analysis of the file fckhffh.a3x reveals that it contains code implementing the DES (Data Encryption Standard) algorithm.

Execution of the fckhffh.a3x file results in the deployment of an DOS file onto the system.

Subsequently, DarkGate initiates its malicious operations and establishes communication with its command and control (C2) infrastructure.

Indicators of Compromise

File NameSHA-256
HTML File1533221ca97e88f5010b4a8b4d392232034dd07f154b13d4413c19693c0304c3
Dark.htaca628638c20f6a67ac80782dc872e1e06b84cda68accf5e912ade6645c689f04
PS File40be7be16cdaa414898db0014d26afd9cf516ba209f074a95c346227e690acd4
.Zip Filefab36431b9760b48eb84d671e7c10e16e0754ec86517d665c10811cd0670e06b
AutoIt Script File4f5f733c7ca71d514991ac3b369e34ce1c3744ff604c88481522edced14cc22c

MITRE ATT&CK

TacticTechniqueIDDescription
ExecutionCommand and Scripting InterpreterT1059.001PowerShell used for in-memory execution
Defense EvasionObfuscated Files or InformationT1027Base64 and reverse encoding used for concealment
Defense EvasionMasqueradingT1036HTA file disguised as a legitimate fix tool
Command & ControlApplication Layer Protocol: Web TrafficT1071.001Payload retrieved over HTTP(S)
ImpactRemote Access Tool T1219Enables full control over infected systems

Prevention and Mitigation

  • User Awareness: Be extremely cautious of unexpected warnings or messages that prompt you to copy and paste code into a command prompt or terminal. Legitimate websites and applications will not ask you to do this.
  • Never Run Unfamiliar Code: Do not execute code from an untrusted source, even if it claims to “fix” an issue.
  • Use Reputable Security Software: Employ a strong antivirus/anti-malware program that uses behavioural analysis to detect unusual activity, not just known signatures.
  • Restrict Access: In enterprise environments, IT administrators can leverage Group Policy Objects (GPOs) to restrict or disable access to the Windows Run command (triggered by Win + R) and enforce controls that prevent users from executing unauthorized or potentially harmful programs from personal directories.
  • Disconnect if Affected: If you suspect you have fallen victim to a ClickFix attack, immediately disconnect the device from the internet and contact IT support. 

Removal

  1. Reboot into Safe Mode with Networking
  2. Use UltraAV antivirus to delete malicious files.
  3. Detected as the following name by UltraAV
  • Trojan.HTML.DarkGate.ORS

Conclusion

ClickFix social engineering tactic represents a sophisticated and technically refined approach to malware delivery. By embedding base64-encoded scripts within deceptive error messages, attackers lure users into executing a sequence of actions that ultimately trigger malicious PowerShell commands. These commands are designed to retrieve and launch payloads—such as HTA files—from remote servers, leading to the deployment of malware like DarkGate.

Once activated, the malware initiates a range of harmful operations, including exfiltrating sensitive user data to its command and control (C2) infrastructure. The execution flow is crafted to avoid detection and ensure persistence, employing techniques such as clearing clipboard history and launching processes in minimized windows. Through misleading prompts and seemingly helpful guidance, attackers manipulate users into unknowingly executing scripts that install and operate various malicious tools.