Connect with us

Security

Malicious ClickFix Exploits App-V Scripts to Infect Windows Devices

Published

on

New ClickFix Attacks Exploit Windows App-V Scripts to Distribute Malware

A recent malicious campaign has combined the ClickFix technique with a fake CAPTCHA and a signed Microsoft Application Virtualization (App-V) script to deliver the Amatera infostealing malware.

The Microsoft App-V script acts as a living-off-the-land binary, using a trusted Microsoft component to execute PowerShell and mask malicious activities.

Microsoft Application Virtualization allows applications to run in isolated virtual environments without actual installation on the system.

Past incidents have seen App-V scripts used to evade security solutions, but this marks the first instance of such a file being utilized in ClickFix attacks to distribute an information stealer.

BlackPoint Cyber reports that the attack commences with a fake CAPTCHA verification, prompting victims to manually execute a command via the Windows Run dialog.

The ClickFix page
The ClickFix page
Source: BlackPoint

The command leverages the legitimate SyncAppvPublishingServer.vbs App-V script to execute PowerShell, ensuring that the user manually executes it.

BlackPoint Cyber researchers note that if the execution is detected in an analysis environment, it stalls silently to potentially thwart automated analysis resources.

Once the conditions are met, the malware retrieves configuration data from a public Google Calendar file containing encoded values.

In subsequent stages, a hidden PowerShell process is spawned via the Windows Management Instrumentation framework, decrypting and loading multiple payloads into memory.

Steganographic image and payload extraction logic
Steganographic image and payload extraction logic
Source: BlackPoint

Payload data is decrypted, decompressed, and executed in memory, launching the Amatera infostealer.

Overview of the infection chain
Overview of the infection chain
Source: BlackPoint

Post-infection, the malware connects to a designated IP address to retrieve mappings and additional payloads via HTTP POST requests.

Amatera is classified as an infostealer that targets browser data and credentials, based on the ACR infostealer with evolving sophistication and available as malware-as-a-service.

See also  Securing Software: Harnessing Ringfencing to Safeguard Against Malicious Use

Defense measures include restricting Windows Run dialog access, removing unnecessary App-V components, enabling PowerShell logging, and monitoring outbound connections for anomalies.

Wiz

Explore our guide for secure secrets management and AI-generated code practices to fortify your team’s development processes.

Download the cheat sheet now to streamline your security practices.

Trending