[ Detection & Response ]

Non-stop defense & compounding learning

Agents are online 24/7, like your attackers.

[ 01 / Investigation ]

Automatic agentic investigation

More than triage. Every case comes with an investigation.

Dynamic reasoning,
not playbooks

Every case is unique. Simba uses agentic reasoning to develop a series of hypotheses to guide its investigation. Its goal: prove or disprove each until it gains enough confidence to close or escalate.

ClickFix Attack on desktop-0321: fixer_update.exe C2 Beaconing to 157.230.130.11 (user jl.picard)

Simba Recommendation

This case requires human investigation

Assign to User
Summary
Regenerate

Successful ClickFix social engineering attack on desktop-0321 with active C2 implant beaconing for 2.5+ hours.

What happened:

  • Account jl.picard on desktop-0321 executed encoded PowerShell commands via Windows Terminal, downloading payloads from https://app.fork-it.cc/install to the TEMP directory. Whether this was the result of social engineering or intentional execution is unconfirmed.
  • Two payloads executed sequentially: fixer.exe (17:21–18:29 UTC, 68 min) then fixer_update.exe (19:18 UTC onward, still active at end of telemetry) — both beaconing to 157.230.130.11:443 at ~75-second intervals.
  • No post-exploitation was observed via Sysmon (no child processes, file drops, registry persistence, or lsass access), suggesting the implant was polling for operator tasking.
  • Unmonitored host 192.168.138.248 (theconstant) RDPed to domain controller dilithium-dc as DILITHIUMDATA\Administrator and to desktop-0321 minutes after C2 started — DC session was a 16-second reconnection with no malicious activity, but the source warrants investigation.

Why this matters:

  • The C2 channel was live and uncontained for 2.5+ hours with jl.picard privileges including SeDebugPrivilege; any operator tasking would be invisible inside the encrypted HTTPS tunnel.
  • The domain fork-it.cc and IP 157.230.130.11 have zero vendor detections — automated blocking won't catch this without manual IOC submission.

Analysis

6 Malicious

3 Interesting

2 Not Interesting

Tasks

7 Open

Notes

None

Transparent.
Not a black box.

Inspect the entirety of the agentic investigation whenever you want. Drill into the details, all the way down to the LLM calls. Cases are append-only. Existing blocks cannot be changed.

ClickFix Attack on desktop-0321: fixer_update.exe C2 Beaconing to 157.230.130.11 (user jl.picard)

11 Analyses
Result
Analysis: Did fixer_update.exe execute on desktop-0321?
Analysis: Network connections from desktop-0321 to external IPs
Analysis: Full activity timeline on desktop-0321

You’re in control

You can always chat with Simba if you have further questions. Simba has the full context of the case and can append the result of any investigation you ask for. Let Simba do all the legwork, so that you can determine the case's final disposition.

🔍 What Each Command Does

Step Action Detail
1. Download
iwr / Invoke-WebRequest

Fetches the payload from

https://app.fork-it.cc/install
2. Save
-OutFile $env:TEMP\fixer[_update].exe
Drops the executable into the user's TEMP directory
3. Verify
Test-path (Wave 2 only)
Confirms the file was written successfully
4. Execute Start-Process Launches the dropped executable
5. Error handling
try/catch (Wave 2 only)
Suppresses errors — a sign of a more polished payload

🧠 Key Observations

  • Wave 2 is more sophisticated than Wave 1 — it added -UseBasicParsing (avoids IE COM object dependency), Test-Path verification, and try/catch error handling. This suggests the attacker updated the lure page between the two waves.
  • The progression from obfuscated → plaintext in Wave 1 suggests jl.picard was following ClickFix instructions and troubleshooting failed attempts — classic social engineering behavior.
  • All three techniques decode to the same core action: download and execute a binary from app.fork-it.cc. The obfuscation was purely to evade detection, not to change behavior.
  • The -EncodedCommand flag in Wave 2 is what ultimately triggered detection DET_26RH3JB (ClickFix via Windows Terminal).

excellent please add this to the case

Added note block to case CAS_1A2OTT6

Done! I've added the full PowerShell decoding analysis as a note block to the case. It includes:

  • Both waves of the attack with their respective obfuscation techniques
  • The fully decoded plaintext for all three variants
  • A step-by-step breakdown table of what each command does
  • Key observations highlighting the evolution from Wave 1 to Wave 2
Write a message...
[ 02 / Intelligence ]

Proactive detection opportunities

Your detection coverage automatically keeps pace with the threat landscape.

Threat actors don't just invent new techniques, they also iterate on existing ones. Simba proactively ingests threat intelligence so that it can reason on even the most subtle gaps in coverage. This keeps your detection current with the techniques and procedures used by currently observed threat actor campaigns.

Simba Proposals

User is socially engineered to open Windows Terminal via Win+X → I shortcut instead of the traditional Run dialog (Win+R), then pastes malicious PowerShell commands. The existing ClickFix detection (DET_1866365) is specifically tuned to Run Dialog registry activity and explorer.exe as parent — Windows Terminal (wt.exe) as parent bypasses this entirely. Detection should look for PowerShell spawned from wt.exe with encoded/hidden flags.

MITRE ATT&CK: Initial Access / T1204

Relevant Datasets: simba.sysmon, simba.sysmon_events, simba.signal_windows_suspicious_process_creation, simba.scenario_windows_clickfix_initial_access

Confidence: 95%

Reason: DET_1866365 only covers Run Dialog (Win+R) path via registry signal. Windows Terminal as parent is a detection gap not covered by any existing detection or work item.

Source: New ClickFix Campaign Bypasses Traditional Detection via Windows Terminal

Simba Proposals

Mar 9, 2026, 1:15 AM
Simba proposed 1 new detection
Trace
ClickFix via Windows Terminal

Related Threat Report

ClickFix campaign threat report thumbnail

New ClickFix Campaign Bypasses Traditional Detection via Windows Terminal

https://x.com/MsftSecIntel/status/202969295118992473

by Microsoft Threat Intelligence - via Feedly - Mar 16, 2026, 12:42 AM

[ 03 / Detection ]

Threat scenario detection

Threat-informed detection engineering.

Multi-stage threat correlation is straightforward with Perpetual. The most effective defense is threat-informed, correlating specific behaviors from known, active threat actor campaigns. Each behavior may seem benign in isolation, but taken together, they rise to the level of an alert.

You can't do that without a pre-curated collection of security relevant events. We call those events signals. Signals are the specific behaviors you look for during detection, investigation, and hunting. Having them ready to go makes everything easier. (It’s also just good engineering. Define it once, use it everywhere.)

You also can't do it unless your query language and engine can detect a sequence of signals occurring in the right order within a given timeframe. This is surprisingly hard to do in other systems. Perpetual makes it simple. Just use the MATCH command in Hamelin

Scenario - Windows ClickFix Initial Access
deploys
scenario_windows_clickfix_initial_access
queries queries queries
signal_windows_suspicious_process_creation
signal_windows_suspicious_usage
queries queries
signal_windows_suspicious_network_connection
queries
sysmon_events
queries
sysmon
queries
connector.sysmon
MATCH process_near_registry network_event=network_event+ AGG event_start = min(timestamp), event_end = max(timestamp), proc_image = first(proc_image), proc_cmd_line = first(proc_cmd_line), proc_parent_image = first(proc_parent_image), proc_user = first(proc_user), reg_key = first(reg_key), reg_value = first(reg_value), dest_ip = last(dest_ip), dest_port = last(dest_port), beacon_count = count(dest_ip) BY host WITHIN 5s
[ 04 / Compounding ]

Reflection and compounding

Your SOC efficiency improves with each cycle through the flywheel, as investigation outcomes influence the quality of your detections.

Detection

Simba, our AI agent, suggests detections from our library for your environment

Simba continuously suggests new detections from threat intelligence

Simba can assist detection engineers improve detection logic

Investigation

Simba triages and investigates cases and only escalates to an analyst when necessary

Cooperate with agents in the case investigation workflow

Agent and analyst investigation activity is fully tracked in append-only cases

Response

Simba suggests response tasks during triage and investigation

Simba can invoke configured response actions while working cases

Analysts maintain full oversight over suggested response actions

Tuning

Simba continuously reflects on case outcomes to ensure detections are not generating noise

Low value, high false positive detections are flagged for tuning with concrete suggestions

Reflection and tuning close the loop and add compounding value to your SOC

Less fatigue, more intrigue

Perpetual platform dashboard
// Built from scratch for AI scale// Your data, in your cloud// Ingest everything, no trade-offs// Built from scratch for AI scale// Your data, in your cloud// Ingest everything, no trade-offs// Built from scratch for AI scale// Your data, in your cloud// Ingest everything, no trade-offs// Built from scratch for AI scale// Your data, in your cloud// Ingest everything, no trade-offs