net use (WebDAV)
The net use command can map remote WebDAV shares as local drives. In March 2026, Atos researchers discovered a ClickFix variant that instructs victims to paste a net use command into the Run dialog. The command maps a remote WebDAV share, executes a batch file from that share, and then removes the mapping. This technique completely avoids PowerShell, MSHTA, and WScript, making it harder to detect. The batch file downloads a ZIP archive containing a trojanized Electron app (modified .asar files) functioning as a C2 beacon. This variant was NOT detected by automated security controls and was only found through manual RunMRU Registry Key analysis.
A system update is required. Please follow the steps below to apply the fix.
Press Win-R on your keyboard
Press Ctrl-V to paste the update command
Press Enter to apply
References:
Mitigations:
Monitor for
net usecommands mapping WebDAV shares from the Run dialogAlert on RunMRU Registry Key entries containing
net usewith remote pathsBlock outbound WebDAV (port 80/443) to untrusted IP addresses
Monitor for .cmd/.bat file execution from mapped network drives
Inspect .asar files in Electron applications for tampering