Detection rules › Sigma
Suspicious FileFix Execution Pattern
Detects suspicious FileFix execution patterns where users are tricked into running malicious commands through browser file upload dialog manipulation. This attack typically begins when users visit malicious websites impersonating legitimate services or news platforms, which may display fake CAPTCHA challenges or direct instructions to open file explorer and paste clipboard content. The clipboard content usually contains commands that download and execute malware, such as information stealing tools.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Execution | T1204.004 User Execution: Malicious Copy and Paste |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
| Security-Auditing | 4688 | A new process has been created. |
Stages and Predicates
Stage 1: selection_exec_parent
or:
ParentImage|endswith: '\brave.exe'
ParentImage|endswith: '\chrome.exe'
ParentImage|endswith: '\firefox.exe'
ParentImage|endswith: '\msedge.exe'
CommandLine|contains: '#'
Stage 2: 1 of selection_cli_lolbin
or:
CommandLine|contains: '%comspec%'
CommandLine|contains: bitsadmin
CommandLine|contains: certutil
CommandLine|contains: cmd
CommandLine|contains: cscript
CommandLine|contains: curl
CommandLine|contains: finger
CommandLine|contains: mshta
CommandLine|contains: powershell
CommandLine|contains: pwsh
CommandLine|contains: regsvr32
CommandLine|contains: rundll32
CommandLine|contains: schtasks
CommandLine|contains: wget
CommandLine|contains: wscript
Stage 3: 1 of selection_cli_captcha
or:
CommandLine|contains: account
CommandLine|contains: anti-bot
CommandLine|contains: botcheck
CommandLine|contains: captcha
CommandLine|contains: challenge
CommandLine|contains: confirmation
CommandLine|contains: fraud
CommandLine|contains: human
CommandLine|contains: identification
CommandLine|contains: identificator
CommandLine|contains: identity
CommandLine|contains: robot
CommandLine|contains: validation
CommandLine|contains: verification
CommandLine|contains: verify
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
ParentImage | ends_with |
|