Threat Actors Exploit Windows Search in AnyDesk ClickFix Attack to Spread MetaStealer

In a striking evolution of the ClickFix scam trend, cybercriminals have ingeniously combined human-verification social engineering with the Windows search protocol to deploy MetaStealer, a notorious infostealer adept at pilfering credentials and exfiltrating sensitive data.

While this attack may initially appear to echo traditional ClickFix and FileFix strategies, its distinctive infection chain—from a counterfeit AnyDesk installer to an MSI package masquerading as a PDF—highlights the increasing sophistication of these “fix” variants.

The assault commences when a target, in search of the legitimate AnyDesk remote-access tool, inadvertently lands on a phishing page at anydeesk[.]ink/download/anydesk.html. This page features a deceptive Cloudflare Turnstile human-verification prompt, designed to ensnare unsuspecting users.

Another attack involving a Cloudflare Turnstile – this time an actual ClickFix attack.

Upon deobfuscating the page’s JavaScript, victims are redirected to verification.anydeesk[.]ink/reCAPTCHA-v2.php. Here, clicking the verification box initiates a Windows File Explorer exploit, diverging from the typical PowerShell or Run dialog executions seen in ClickFix campaigns.

Rather than instructing users to input commands into the Run dialog or the File Explorer address bar, the phishing page cleverly utilizes the search-ms URI scheme. This method displays a custom search query name as part of the search-ms URI protocol, further enhancing the attack’s stealth.

The displayname parameter for search-ms reveals the next phase of the attack.

When victims click “verify,” their browser triggers Windows File Explorer, which automatically opens a custom search query defined by the displayname parameter in the search-ms URI. This query discreetly connects to an attacker-controlled SMB share, presenting the user with what appears to be a PDF titled Readme AnyDesk.pdf.

Disguised LNK Shortcut Snags Hostnames

However, lurking behind the façade of a PDF is a malicious Windows shortcut (LNK) file. Executing this shortcut initiates two simultaneous actions: it silently downloads the legitimate AnyDesk installer via Microsoft Edge—likely to create an illusion of a genuine application installation—and retrieves a so-called “PDF” from chat1[.]store into a temporary directory.

A Windows shortcut file disguised as a decoy AnyDesk PDF.

Notably, the “PDF” installer leverages the victim’s %COMPUTERNAME% environment variable to construct its download URL, thereby capturing the hostname without the need for prior configuration in each campaign.

An analysis of the chat1[.]store server, accessed through a curl user agent, unveiled the complete MSI package. Within this package, a CustomActionDLL and a compressed CAB archive (Binary.bz.WrappedSetupProgram) contain two critical malicious components: a cleanup JavaScript (1.js) and ls26.exe, the MetaStealer dropper.

The “solution” presented to victims involves copying and pasting a command provided through an attacker-controlled prompt, which discreetly initiates the attack chain.

[embedded content]

Protected by Private EXE Protector, ls26.exe operates similarly to known MetaStealer samples, scanning for browser credentials, cryptocurrency wallet files, and document stores before exfiltration occurs.

Although this attack retains familiar elements of traditional ClickFix and FileFix lures—specifically, social engineering prompts disguised as CAPTCHA—the transition to search-ms URIs and SMB shares signifies a notable advancement in tactics. Unlike ClickFix, which prompts users to paste commands into the Run dialog, and FileFix, which exploits the File Explorer address bar, this new variant effectively circumvents user suspicion by presenting a familiar Remote Desktop installation alongside a malicious installer.

Defensive Measures and User Education

Organizations that have successfully mitigated classic ClickFix threats by disabling or restricting the Windows Run dialog may still find themselves vulnerable to search-ms-based lures. To enhance defenses, it is advisable to:

  • Enforce strict application whitelisting to prevent unauthorized script execution and MSI installations.
  • Monitor and restrict Windows protocol handlers like search-ms from accessing untrusted SMB shares.
  • Educate users to be skeptical of unsolicited CAPTCHAs or verification prompts that request any level of command execution or file opening.
  • Deploy endpoint detection rules to flag unexpected launches of msiexec.exe, cmd.exe downloads, and SMB share connections to unfamiliar hosts.

As threat actors continue to refine “fix”-style attacks, the integration of legitimate features with social engineering tactics will remain a formidable evasion strategy. Ongoing user training and layered technical controls are crucial to identifying and disrupting these evolving infection chains before they can deploy infostealers like MetaStealer.

IOCs

Indicator Description
https[://]anydeesk[.]ink/download/anydesk[.]html Domain with fake Cloudflare Turnstile
macawiwmaacckuow[.]xyz MetaStealer C2 Domain
yeosyyyaewokgioa[.]xyz MetaStealer C2 Domain
cmqsqomiwwksmcsw[.]xyz MetaStealer C2 Domain
38[.]134[.]148[.]74 MetaStealer C2 IP Address
ls26.exe
SHA256
0fc76b7f06aa80a43abafc1e9b88348734e327feb306d700c877c6a210fbd5e7
MetaStealer dropper PE
CustomActionDLL
SHA256
fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
File found in MSI package
Binary.bz.WrappedSetupProgram
SHA256
513992d7076984d5c5a42affc12b6a00eef820f3254af75c9958ef3310190317
CAB file containing malicious components

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Winsage
Threat Actors Exploit Windows Search in AnyDesk ClickFix Attack to Spread MetaStealer