SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato


As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2022-08-25SentinelOneJim Walter
@online{walter:20220825:bluesky:1d0f4f0, author = {Jim Walter}, title = {{BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar}}, date = {2022-08-25}, organization = {SentinelOne}, url = {https://www.sentinelone.com/blog/bluesky-ransomware-ad-lateral-movement-evasion-and-fast-encryption-puts-threat-on-the-radar/}, language = {English}, urldate = {2022-08-30} } BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky Cobalt Strike JuicyPotato
2022-01-17Trend MicroJoseph Chen, Kenney Lu, Gloria Chen, Jaromír Hořejší, Daniel Lunghi, Cedric Pernet
@techreport{chen:20220117:delving:4cd2b1c, author = {Joseph Chen and Kenney Lu and Gloria Chen and Jaromír Hořejší and Daniel Lunghi and Cedric Pernet}, title = {{Delving Deep: An Analysis of Earth Lusca’s Operations}}, date = {2022-01-17}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf}, language = {English}, urldate = {2022-07-25} } Delving Deep: An Analysis of Earth Lusca’s Operations
BIOPASS Cobalt Strike FunnySwitch JuicyPotato ShadowPad Winnti Earth Lusca
2021-08-09ESET ResearchZuzana Hromcová
@online{hromcov:20210809:iispy:c0b6ad3, author = {Zuzana Hromcová}, title = {{IISpy: A complex server‑side backdoor with anti‑forensic features}}, date = {2021-08-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/08/09/iispy-complex-server-side-backdoor-antiforensic-features/}, language = {English}, urldate = {2021-09-19} } IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05LIFARSLIFARS
@techreport{lifars:202005:xmrigbased:5e57232, author = {LIFARS}, title = {{XMRig-based CoinMinersby Blue Mockingbird Threat Actor}}, date = {2020-05}, institution = {LIFARS}, url = {https://lifars.com/wp-content/uploads/2020/06/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf}, language = {English}, urldate = {2020-06-19} } XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
@online{ohpe:20190114:juicy:d9ac671, author = {OHPE}, title = {{Juicy Potato (abusing the golden privileges)}}, date = {2019-01-14}, organization = {Github (ohpe)}, url = {https://github.com/ohpe/juicy-potato}, language = {English}, urldate = {2020-06-19} } Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20221125 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { e9???????? 488b9540070000 4c8d0562b20200 498bce e8???????? 85c0 }
            // n = 6, score = 100
            //   e9????????           |                     
            //   488b9540070000       | xor                 ecx, ecx
            //   4c8d0562b20200       | dec                 eax
            //   498bce               | mov                 dword ptr [edx], ecx
            //   e8????????           |                     
            //   85c0                 | dec                 eax

        $sequence_1 = { 7504 33c0 eb04 488b4050 48898100010000 488d05039c0100 498bc9 }
            // n = 7, score = 100
            //   7504                 | add                 esp, 0x20
            //   33c0                 | dec                 eax
            //   eb04                 | mov                 dword ptr [edx + 8], ecx
            //   488b4050             | dec                 eax
            //   48898100010000       | lea                 ecx, [eax + 8]
            //   488d05039c0100       | dec                 eax
            //   498bc9               | lea                 eax, [0x1b0e9]

        $sequence_2 = { e8???????? 488bf8 488b0e e8???????? 488bd8 448b07 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   488bf8               | dec                 ecx
            //   488b0e               | mov                 dword ptr [ebx - 0x28], eax
            //   e8????????           |                     
            //   488bd8               | inc                 ebp
            //   448b07               | xor                 ecx, ecx

        $sequence_3 = { 488d0dc1c0feff 48c1e602 0fb784b950fc0300 488d9140f30300 488d8d24030000 4c8bc6 4803cb }
            // n = 7, score = 100
            //   488d0dc1c0feff       | mov                 ecx, dword ptr [ebx]
            //   48c1e602             | dec                 eax
            //   0fb784b950fc0300     | test                ecx, ecx
            //   488d9140f30300       | inc                 eax
            //   488d8d24030000       | push                ebx
            //   4c8bc6               | dec                 eax
            //   4803cb               | sub                 esp, 0x20

        $sequence_4 = { 84c0 0f84b8000000 452be5 488d1551bdfeff 4489642440 0f8534fcffff }
            // n = 6, score = 100
            //   84c0                 | lea                 eax, [0x3c848]
            //   0f84b8000000         | dec                 eax
            //   452be5               | mov                 eax, dword ptr [ebx]
            //   488d1551bdfeff       | dec                 eax
            //   4489642440           | arpl                word ptr [eax], cx
            //   0f8534fcffff         | dec                 eax

        $sequence_5 = { e8???????? 482be0 48c7442440feffffff 48899c2498160000 4889b424a0160000 488b05???????? 4833c4 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   482be0               | dec                 eax
            //   48c7442440feffffff     | shl    edx, 6
            //   48899c2498160000     | dec                 ecx
            //   4889b424a0160000     | mov                 ecx, dword ptr [eax + ecx*8]
            //   488b05????????       |                     
            //   4833c4               | dec                 eax

        $sequence_6 = { 488905???????? 488d0d53830200 48894c2428 488d0def540200 48894c2420 41b907000000 4c8d05458d0100 }
            // n = 7, score = 100
            //   488905????????       |                     
            //   488d0d53830200       | cmp                 eax, 1
            //   48894c2428           | jbe                 0x636
            //   488d0def540200       | dec                 ecx
            //   48894c2420           | mov                 ecx, ecx
            //   41b907000000         | dec                 eax
            //   4c8d05458d0100       | lea                 edx, [0x3d354]

        $sequence_7 = { 49c743d8feffffff 49895b18 488d05d9180300 49894310 }
            // n = 4, score = 100
            //   49c743d8feffffff     | mov                 eax, edx
            //   49895b18             | dec                 eax
            //   488d05d9180300       | lea                 ecx, [0x341c5]
            //   49894310             | dec                 eax

        $sequence_8 = { 488913 488d542468 48894810 488b0d???????? c7401801000000 ff15???????? 488d542458 }
            // n = 7, score = 100
            //   488913               | cmovle              edx, eax
            //   488d542468           | dec                 eax
            //   48894810             | lea                 edx, [0x236ff]
            //   488b0d????????       |                     
            //   c7401801000000       | dec                 eax
            //   ff15????????         |                     
            //   488d542458           | lea                 ecx, [ebp]

        $sequence_9 = { 4c8d0562b20200 498bce e8???????? 85c0 }
            // n = 4, score = 100
            //   4c8d0562b20200       | dec                 eax
            //   498bce               | test                edx, edx
            //   e8????????           |                     
            //   85c0                 | jne                 0x1aa3

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules