FileFix - Suspicious Child Process from Browser File Upload Abuse
Detects potentially suspicious subprocesses such as LOLBINs spawned by web browsers. This activity could be associated with the "FileFix" social engineering technique, where users are tricked into launching the file explorer via a browser-based phishing page and pasting malicious commands into the address bar. The technique abuses clipboard manipulation and disguises command execution as benign file path access, resulting in covert execution of system utilities.
Sigma rule (View on GitHub)
1title: FileFix - Suspicious Child Process from Browser File Upload Abuse
2id: 4be03877-d5b6-4520-85c9-a5911c0a656c
3status: experimental
4description: |
5 Detects potentially suspicious subprocesses such as LOLBINs spawned by web browsers. This activity could be associated with the "FileFix" social engineering technique,
6 where users are tricked into launching the file explorer via a browser-based phishing page and pasting malicious commands into the address bar.
7 The technique abuses clipboard manipulation and disguises command execution as benign file path access, resulting in covert execution of system utilities.
8references:
9 - https://mrd0x.com/filefix-clickfix-alternative/
10author: 0xFustang
11date: 2025-06-26
12modified: 2025-06-30
13tags:
14 - attack.execution
15 - attack.t1204.004
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection:
21 ParentImage|endswith:
22 - '\brave.exe'
23 - '\chrome.exe'
24 - '\firefox.exe'
25 - '\msedge.exe'
26 Image|endswith:
27 - '\bitsadmin.exe'
28 - '\certutil.exe'
29 - '\cmd.exe'
30 - '\mshta.exe'
31 - '\powershell.exe'
32 - '\pwsh.exe'
33 - '\regsvr32.exe'
34 CommandLine|contains: '#'
35 condition: selection
36falsepositives:
37 - Legitimate use of PowerShell or other utilities launched from browser extensions or automation tools
38level: high
References
Related rules
- Suspicious Download and Execute Pattern via Curl/Wget
- PowerShell MSI Install via WindowsInstaller COM From Remote Location
- Potential Exploitation of RCE Vulnerability CVE-2025-33053
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Image Load
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access