SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato


As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2021-08-09ESET ResearchZuzana Hromcová
@online{hromcov:20210809:iispy:c0b6ad3, author = {Zuzana Hromcová}, title = {{IISpy: A complex server‑side backdoor with anti‑forensic features}}, date = {2021-08-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/08/09/iispy-complex-server-side-backdoor-antiforensic-features/}, language = {English}, urldate = {2021-09-19} } IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05LIFARSLIFARS
@techreport{lifars:202005:xmrigbased:5e57232, author = {LIFARS}, title = {{XMRig-based CoinMinersby Blue Mockingbird Threat Actor}}, date = {2020-05}, institution = {LIFARS}, url = {https://lifars.com/wp-content/uploads/2020/06/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf}, language = {English}, urldate = {2020-06-19} } XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
@online{ohpe:20190114:juicy:d9ac671, author = {OHPE}, title = {{Juicy Potato (abusing the golden privileges)}}, date = {2019-01-14}, organization = {Github (ohpe)}, url = {https://github.com/ohpe/juicy-potato}, language = {English}, urldate = {2020-06-19} } Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20220516 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 488d05721d0400 4a8b0ce8 42f644313880 744d 0fbecb 84db 7432 }
            // n = 7, score = 100
            //   488d05721d0400       | dec                 eax
            //   4a8b0ce8             | lea                 edx, [0x33bc4]
            //   42f644313880         | dec                 eax
            //   744d                 | mov                 ecx, ebx
            //   0fbecb               | dec                 eax
            //   84db                 | lea                 edx, [0x33bd0]
            //   7432                 | dec                 eax

        $sequence_1 = { e8???????? 0f2845af 4d8bc4 0f284dbf 488bf0 8b4d07 488b55f7 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   0f2845af             | lea                 eax, [esp + 0x60]
            //   4d8bc4               | dec                 eax
            //   0f284dbf             | mov                 dword ptr [esp + 0x20], eax
            //   488bf0               | inc                 ebp
            //   8b4d07               | xor                 ecx, ecx
            //   488b55f7             | inc                 ebp

        $sequence_2 = { 8bc8 e8???????? 90 eb0e }
            // n = 4, score = 100
            //   8bc8                 | dec                 eax
            //   e8????????           |                     
            //   90                   | lea                 ecx, [eax + 8]
            //   eb0e                 | dec                 eax

        $sequence_3 = { 752c 4883c448 e9???????? 488d1546450200 }
            // n = 4, score = 100
            //   752c                 | mov                 ecx, edi
            //   4883c448             | dec                 eax
            //   e9????????           |                     
            //   488d1546450200       | lea                 edx, [0x33b5a]

        $sequence_4 = { 488d4808 e8???????? 488d05f9b00100 488903 488bc3 4883c420 }
            // n = 6, score = 100
            //   488d4808             | lea                 eax, [0x23773]
            //   e8????????           |                     
            //   488d05f9b00100       | dec                 eax
            //   488903               | mov                 dword ptr [ecx], eax
            //   488bc3               | dec                 eax
            //   4883c420             | mov                 dword ptr [eax + 0x18], ebp

        $sequence_5 = { 48837b7000 7520 6690 488bd3 488d4b78 e8???????? }
            // n = 6, score = 100
            //   48837b7000           | mov                 ecx, eax
            //   7520                 | dec                 eax
            //   6690                 | lea                 edx, [0x33bfb]
            //   488bd3               | dec                 eax
            //   488d4b78             | mov                 ebx, eax
            //   e8????????           |                     

        $sequence_6 = { 488d0527740100 488bf9 488901 4533c0 4883c110 e8???????? 488b5c2430 }
            // n = 7, score = 100
            //   488d0527740100       | dec                 eax
            //   488bf9               | mov                 eax, ecx
            //   488901               | dec                 eax
            //   4533c0               | mov                 dword ptr [ecx + 8], edx
            //   4883c110             | ret                 
            //   e8????????           |                     
            //   488b5c2430           | xor                 eax, eax

        $sequence_7 = { 48896c2438 488d542470 4c896c2430 4533c9 4c896c2428 458d4501 33c9 }
            // n = 7, score = 100
            //   48896c2438           | xor                 ecx, ecx
            //   488d542470           | inc                 esp
            //   4c896c2430           | mov                 eax, dword ptr [esi]
            //   4533c9               | dec                 ecx
            //   4c896c2428           | mov                 edx, esi
            //   458d4501             | dec                 eax
            //   33c9                 | mov                 ecx, dword ptr [edi + 0x28]

        $sequence_8 = { 4585e4 0f88be040000 41f7e4 8bc2 488d1528c1feff c1e803 89442448 }
            // n = 7, score = 100
            //   4585e4               | dec                 esp
            //   0f88be040000         | mov                 ecx, edi
            //   41f7e4               | dec                 esp
            //   8bc2                 | lea                 eax, [0xffffef95]
            //   488d1528c1feff       | dec                 eax
            //   c1e803               | lea                 ecx, [ebp - 0x20]
            //   89442448             | dec                 eax

        $sequence_9 = { 488d4808 e8???????? 488d05e9b00100 488903 }
            // n = 4, score = 100
            //   488d4808             | dec                 eax
            //   e8????????           |                     
            //   488d05e9b00100       | mov                 dword ptr [ebx], ecx
            //   488903               | dec                 eax

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules