How Is the New Click-Fix Variant Bypassing Modern EDR?

How Is the New Click-Fix Variant Bypassing Modern EDR?

Malik Haidar is a cybersecurity expert with extensive experience in combating threats and hackers within multinational corporations. His expertise encompasses analytics, intelligence, and security, with a strong focus on integrating business perspectives into cybersecurity strategies. In this discussion, we explore the mechanics of a sophisticated new Click-Fix variant that leverages native Windows utilities and Electron application vulnerabilities to bypass traditional defenses. We delve into the technical nuances of WebDAV-based execution, the challenges of inspecting ASAR archives, and the critical role of hypothesis-driven threat hunting in identifying stealthy, low-signal attacks.

The shift toward using the Run dialog and WebDAV to map external drives bypasses many automated defenses. How does this technique complicate the initial response for a security team, and what specific steps are necessary to identify these transient network mappings before they are deleted?

This technique is particularly devious because it utilizes “net use” to mount a remote WebDAV share, which many legacy systems still view as legitimate networking behavior. From a response perspective, it creates a “blink-and-you-miss-it” scenario because the command explicitly includes a “/delete” flag that wipes the mapping the moment the script finishes. To catch this, security teams cannot rely on post-incident disk forensics; they must instead have robust telemetry that captures real-time command-line arguments and registry modifications. Specifically, looking for the “net use” command paired with a public IP address, like 94.156.170.255, provides the necessary breadcrumbs to identify the external staging point. Furthermore, monitoring for the “persistent:no” flag in connection events can help analysts flag these ephemeral mappings before the attacker covers their tracks.

Injecting malicious code into an Electron app’s ASAR archive allows it to run with full Node.js privileges. What are the technical hurdles in inspecting these archives at scale, and how can organizations harden systems to prevent unauthorized modifications to legitimate, signed binaries?

The primary hurdle is that ASAR archives are essentially opaque blobs to most standard antivirus scanners, as they are designed to mitigate path-length issues rather than act as a security boundary. Because the malicious code—in this case, a modified “main.js”—is tucked inside a signed Electron bundle like WorkFlowy, it often inherits the “trusted” status of the parent application. Organizations can harden their systems by implementing strict Application Control policies that validate the integrity of the entire application folder, not just the primary “.exe” file. Since the attacker replaces the legitimate “app.asar” with a 1.4 version to bypass the current 4.3 version’s security, monitoring for version mismatches or unsigned files within “Program Files” or “%LOCALAPPDATA%” is a vital step. Additionally, enforcing code signing checks that include the resource files can prevent the execution of these trojanized archives entirely.

Using a victim ID file in the application data folder and high-frequency beaconing allows for stealthy host tracking. What are the risks of overlooking these small artifacts during a routine sweep, and how can defenders distinguish legitimate application traffic from these two-second heartbeats?

The risk of overlooking a file like “id.txt” in the “%APPDATA%” directory is extremely high because it appears mundane and occupies almost no space, yet it provides the attacker with a permanent anchor for tracking a specific machine. This 8-character alphanumeric ID allows the C2 server to maintain a stable relationship with the victim even if the IP address changes. To distinguish this from legitimate traffic, defenders should analyze the frequency and payload of outbound HTTP POST requests; a consistent two-second heartbeat is rarely the behavior of a standard productivity tool. By correlating these high-frequency network spikes with the execution of “WorkFlowy.exe,” an analyst can identify the beaconing behavior of the injected IIFE function. If the “id.txt” file exists alongside this traffic, it confirms that the host has been successfully fingerprinted by the adversary.

Threat hunting often uncovers what automated systems miss, such as suspicious entries in the RunMRU registry key. Could you walk through a methodology for hunting commands originating from the explorer process and share how this context changes your understanding of the attack chain?

Our hunting methodology focuses on the “RunMRU” registry key, which logs every command a user enters into the Win+R dialog. We specifically look for instances where “explorer.exe” is the initiating process for high-risk binaries like “cmd.exe,” “powershell.exe,” or “mshta.exe.” In this Click-Fix campaign, seeing a “net use” command mapped to a Z: drive followed by the execution of a “.cmd” file was the “smoking gun” that automated EDRs missed. This context changes our understanding because it proves the attacker is no longer just trying to run a script; they are using the user’s own actions to bootstrap a network-based infection. By focusing on the “RunMRU” telemetry, we move from searching for a specific malware signature to identifying the fundamental behavioral anomaly of a user being socially engineered into attacking their own machine.

Modern campaigns are increasingly utilizing native networking utilities like “net use” to proxy their execution. In a scenario where an attacker avoids common scripting engines, what metrics should be used to measure the effectiveness of your detection controls?

When attackers abandon PowerShell or MSHTA in favor of native utilities, we have to pivot our metrics toward “Visibility Coverage” and “Mean Time to Detect” (MTTD) for LOLBin abuse. We should measure how many of our endpoints are actively logging Command Line Process Auditing (Event ID 4688) specifically for utilities like “net.exe” and “net1.exe.” Another critical metric is the percentage of “unattributed network connections” originating from non-browser processes like “cmd.exe” to external IPs. If our systems aren’t flagging a “net use” command to an external WebDAV server within minutes, our detection effectiveness is essentially zero for this class of threat. We also track the “False Positive Ratio” of these alerts to ensure that our hunters are focusing on actual threats rather than legitimate administrative activity, which is the only way to maintain a high-fidelity defense.

What is your forecast for Click-Fix?

I expect Click-Fix to evolve into a “Living-off-the-Cloud” hybrid model where the initial command execution doesn’t just map a drive, but integrates directly with legitimate cloud APIs or synchronization services to blend in with standard enterprise traffic. As defenders get better at spotting “net use” and WebDAV, attackers will likely shift toward using built-in synchronization tools or even browser-based file system access to stage their payloads. We will see more “chained” execution flows where the initial “Win+R” command is just a tiny, innocuous-looking trigger that pulls down more complex, multi-stage loaders hidden within trusted application ecosystems. The battle will move away from blocking files and toward deep behavioral analysis of the interaction between the user, the operating system’s native shells, and external network resources.

subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address