Skip to main content
ClickFix: The Fake CAPTCHA Trap operation cover
BeginnerSIEMXDR

ClickFix: The Fake CAPTCHA Trap

Investigate a modern 'ClickFix' social engineering attack where a user was tricked into executing a malicious PowerShell command via a fake CAPTCHA interface. You will analyze SIEM and XDR telemetry to trace the infection from the initial web lure to the deployment of an infostealer.

30m
6 tasks
90 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying the Origin of Execution

15

During a routine audit of corp-wks-115, an unusual script execution was detected on 2024-05-12T11:25:37.271Z involving the user l.chen. You need to determine which logging facility or source provided the visibility for this specific event to ensure our monitoring coverage is complete.

SOC{...}Hint available
2

Investigating Unauthorized Connection Attempts

15

An alert was triggered indicating that corp-wks-712 attempted to communicate with an external IP address associated with a known command-and-control server. You need to verify if the network security controls successfully mitigated this threat or if the traffic was permitted to pass through.

SOC{...}Hint available
3

Identify Malicious File Execution via SIEM Logs

15

An alert was triggered for suspicious activity on corp-wks-712 involving the user m.garcia. You need to examine the raw log content within the SIEM to find the specific malicious payload that was executed during this event.

SOC{...}Hint available
4

Tracing Network Communication

15

An automated alert triggered for an unusual outbound connection on corp-wks-712. You must analyze the event timeline to determine which external domain was being reached by the process during this activity.

SOC{...}Hint available
5

Investigating Suspicious Execution on corp-wks-712

15

An alert was triggered at 2024-05-12T11:27:06.650Z involving user m.garcia. An unknown process appears to have initiated a connection to a remote URL to fetch and execute code; you must determine which system utility was abused for this execution.

SOC{...}Hint available
6

Investigating Suspicious Network Communications

15

An automated alert triggered for a workstation communicating with an unverified external resource. You need to investigate the SIEM logs to determine the specific domain that was contacted during this event.

SOC{...}Hint available

6 tasks · 90 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Beginner

Ideal for newcomers to SOC operations. Guided investigation with clear indicators.

Prerequisites

  • No prior experience required
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more