>I would like to use a vMX in AWS as a AutoVPN Hub to provide (amongst other things) access to the internet for clients at Spoke sites that appears from a single, statically assigned public facing IP address using elastic IP in AWS.
AWS does not allow this. The AWS gateway will only NAT traffic for AWS subnets - not for remote subnets.
HOWEVER, you can actually make this work, by putting the VMX behind another virtual device that does NAT (like a virtual router or firewall). Your remote subnets will then come into the VMX, and then pass through the next virtual NAT device which will NAT your remote subnets to the IP address of the NAT gateway - which is from a subnet in AWS - and now that IP address can pass through the Amazon NAT gateway and get to the Internet.
You will need a medium AWS skill level to do this kind of deployment.
A simpler solution would be to deploy an old school proxy server and have the clients use that.
Personally, I would explore a better model - moving to a zero-trust approach - where security is not dependent on what IP address things on the Internet are accessed from. Instead, use things like MFA. But I appreciate this may not be trivial.