A recent Clickfix sample demonstrates how attackers can use built-in Terminal customization features on Windows 11 systems to make social engineering lures appear more legitimate. This involves altering the appearance of the PowerShell command prompt and terminal output to mimic trusted services like Cloudflare.
In this example, the lure begins by copying a malicious PowerShell command to the clipboard with a Cloudflare-themed prompt. When executed, the Terminal displays themed output that appears legitimate while the payload is downloaded and activated in the background. Key customization techniques include:
- Host.UI.RawUI.WindowTitle: Changes the console tab name.
- Clear-Host: Clears the command from view after execution.
- ANSI Color Schemes and Icons: Enhances visual appeal to make the lure seem more credible.
These customizations can significantly improve the appearance of a Clickfix lure, making it harder for users to identify suspicious activity. For detection purposes, keywords that alter Terminal appearance could be incorporated into analytics tools like Microsoft Defender for Endpoint (MDE) KQL queries.
KQL examples provided include:
- Detecting Win + X execution.
- Identifying direct Terminal execution.
- Analyzing evasive techniques such as nested command execution and process tree fragmentation using
wt.exe.
These analytics offer a
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



