Open
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://redcanary.com/blog/threat-intelligence/scarlet-goldfinch-clickfix/ Content Categories: Based on the analysis, this content was categorized under "Windows Hardening -> (new/adapt) Windows tradecraft/defense-evasion notes, or Pentesting Web/Generic Hacking -> Social Engineering/Phishing Methodology (ClickFix/paste-and-run) + Windows LOLBAS (mshta/cmd obfuscation) + DLL Hijacking/Sideloading". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title / scope
Red Canary documents how the threat cluster it tracks as Scarlet Goldfinch evolved its user-execution initial access tradecraft into paste-and-run (often called ClickFix): victims are socially engineered (CAPTCHA-style “fix” prompts) into copying attacker-provided command lines and executing them via Windows execution surfaces (e.g., command prompt/Run dialog). Red Canary maps this to MITRE ATT&CK T1204.004 – User Execution: Malicious Copy and Pas...
🔧 Technical Details
Paste-and-run (ClickFix) initial access (T1204.004): Present a compromised-site lure (often CAPTCHA/“fix” themed) that instructs the user to copy/paste attacker-controlled commands into Windows execution surfaces. This yields code execution without exploiting a software vulnerability, so prevention must focus on user execution controls, script/command-line telemetry, and hardening against LOLBAS abuse.
HTA execution via LOLBAS + network-evasion split: Use
cmdto runcurland download an.htato disk, then execute it withmshta. By splitting download and execution, defenders relying on detections formshta-initiated network activity may miss the transfer whilemshtastill provides initial execution.CMD obfuscation with delayed expansion + caret escapes + substring indexing: Enable delayed environment variable expansion (
cmd.exe /v:on) to build and chain command...🤖 Agent Actions
I’m mapping the repository first and then I’ll read the most relevant Windows, phishing, LOLBAS, and DLL sideloading pages to find the single best target file without duplicating existing content.
The repo already contains ClickFix and DLL sideloading material, so I’m reading the existing phishing and Windows tradecraft pages now to see whether the Scarlet Goldfinch mechanics are already covered or whether there’s a concrete gap worth adding.
I found the main gap: the phishing page already mentions Scarlet Goldfinch at a high level, but it does not capture the Epoch 7 mechanics that matter for detection, especially
cmd.exe /v:on, caret-splitting, substring-based command reconstruction, and thecmd/curlplusmshtasplit. I’m verifying those details against the source page before editing the existing ClickFix page.I’ve narrowed it to a single-file update in clipboard-hijacking.md. The file already owns ClickFix tradecraft, and the missing piece is a compact Epoch 7 subsection covering the
forfilestoif existswap,cmd.exe /v:on, caret and substring obfuscation, and thecurltomshtasplit with the Remcos sideload chain.The edit is in place. I’m checking the rendered section and diff now to make sure the new material is concise, non-duplicative, and the references section still sits at the end of the file.
Updated clipboard-hijacking.md with a new Scarlet Goldfinch Epoch 7 subsection. I kept it in the existing ClickFix page because the repo already covers the broader DLL sideloading mechanics elsewhere, while this blog adds new paste-and-run tradecraft details that were missing there.
The new content captures the parts not yet documented: the
forfilestoif existdetection-surface swap,cmd.exe /v:ondelayed expansion, caret-based CMD obfuscation, substring-index reconstruction ofcurl, thecurlto local-HTA plusmshtasplit to avoidmshtanetwork telemetry, and the follow-on%LOCALAPPDATA%numeric staging plustar -xfplusInvoke-CimMethodRemcos sideload chain. I also added the Red Canary blog to the file’s## Referencessection. Verified withgit diffandgit status; only that single file changed.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.