SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato


As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2021-08-09ESET ResearchZuzana Hromcová
@online{hromcov:20210809:iispy:c0b6ad3, author = {Zuzana Hromcová}, title = {{IISpy: A complex server‑side backdoor with anti‑forensic features}}, date = {2021-08-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/08/09/iispy-complex-server-side-backdoor-antiforensic-features/}, language = {English}, urldate = {2021-09-19} } IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05LIFARSLIFARS
@techreport{lifars:202005:xmrigbased:5e57232, author = {LIFARS}, title = {{XMRig-based CoinMinersby Blue Mockingbird Threat Actor}}, date = {2020-05}, institution = {LIFARS}, url = {https://lifars.com/wp-content/uploads/2020/06/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf}, language = {English}, urldate = {2020-06-19} } XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
@online{ohpe:20190114:juicy:d9ac671, author = {OHPE}, title = {{Juicy Potato (abusing the golden privileges)}}, date = {2019-01-14}, organization = {Github (ohpe)}, url = {https://github.com/ohpe/juicy-potato}, language = {English}, urldate = {2020-06-19} } Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20211008 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-10-07"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20211007"
        malpedia_hash = "e5b790e0f888f252d49063a1251ca60ec2832535"
        malpedia_version = "20211008"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 488bd9 488bc2 488d0d55e40100 48890b 488d5308 33c9 }
            // n = 6, score = 100
            //   488bd9               | je                  0x444
            //   488bc2               | mov                 ecx, eax
            //   488d0d55e40100       | dec                 eax
            //   48890b               | mov                 dword ptr [esp + 0x40], ebx
            //   488d5308             | dec                 eax
            //   33c9                 | mov                 dword ptr [esp + 0x48], ebp

        $sequence_1 = { e8???????? 0f2845af 4d8bc4 0f284dbf 488bf0 8b4d07 488b55f7 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   0f2845af             | dec                 eax
            //   4d8bc4               | lea                 eax, dword ptr [0x22b0d]
            //   0f284dbf             | je                  0x690
            //   488bf0               | dec                 eax
            //   8b4d07               | lea                 ecx, dword ptr [0x430f4]
            //   488b55f7             | or                  eax, 0xffffffff

        $sequence_2 = { 48895c2408 57 4883ec20 8bd9 4c8d0d090a0300 b906000000 }
            // n = 6, score = 100
            //   48895c2408           | shl                 edx, 6
            //   57                   | inc                 ebp
            //   4883ec20             | mov                 edi, eax
            //   8bd9                 | dec                 esp
            //   4c8d0d090a0300       | mov                 esp, edx
            //   b906000000           | mov                 dword ptr [esp + 0x80], eax

        $sequence_3 = { 48894818 488b4c2450 488910 488d15cd2b0400 488913 }
            // n = 5, score = 100
            //   48894818             | mov                 edi, ecx
            //   488b4c2450           | dec                 eax
            //   488910               | lea                 edx, dword ptr [0x2eef6]
            //   488d15cd2b0400       | dec                 eax
            //   488913               | sub                 esp, 0x20

        $sequence_4 = { 488bcb 488905???????? ff15???????? 483305???????? 488d15543b0300 488bcb 488905???????? }
            // n = 7, score = 100
            //   488bcb               | dec                 eax
            //   488905????????       |                     
            //   ff15????????         |                     
            //   483305????????       |                     
            //   488d15543b0300       | mov                 edi, ecx
            //   488bcb               | dec                 eax
            //   488905????????       |                     

        $sequence_5 = { 750d 488bcb e8???????? e9???????? 4c8d2587e20300 }
            // n = 5, score = 100
            //   750d                 | inc                 ecx
            //   488bcb               | cmp                 byte ptr [edi + ecx], 0
            //   e8????????           |                     
            //   e9????????           |                     
            //   4c8d2587e20300       | jne                 0x1389

        $sequence_6 = { 488d1536340200 488d4c2440 e8???????? cc ff15???????? 0fb7d0 488d4c2460 }
            // n = 7, score = 100
            //   488d1536340200       | dec                 eax
            //   488d4c2440           | mov                 eax, edx
            //   e8????????           |                     
            //   cc                   | dec                 eax
            //   ff15????????         |                     
            //   0fb7d0               | lea                 ecx, dword ptr [0x12fb5]
            //   488d4c2460           | dec                 eax

        $sequence_7 = { 4883ec20 488d99c8000000 488bf9 488d05118e0100 488bd3 488901 4883c118 }
            // n = 7, score = 100
            //   4883ec20             | arpl                cx, dx
            //   488d99c8000000       | dec                 eax
            //   488bf9               | lea                 ecx, dword ptr [0x4033c]
            //   488d05118e0100       | dec                 eax
            //   488bd3               | mov                 eax, edx
            //   488901               | and                 edx, 0x3f
            //   4883c118             | dec                 eax

        $sequence_8 = { 488bc1 c3 33c0 48894108 48894110 488d05ff7c0200 }
            // n = 6, score = 100
            //   488bc1               | dec                 eax
            //   c3                   | mov                 ecx, eax
            //   33c0                 | dec                 eax
            //   48894108             | mov                 dword ptr [eax + 8], ecx
            //   48894110             | dec                 eax
            //   488d05ff7c0200       | mov                 dword ptr [eax + 0x10], ecx

        $sequence_9 = { 85db 0f84a6000000 488d0d8d220400 e8???????? b9f4010000 ff15???????? }
            // n = 6, score = 100
            //   85db                 | lea                 eax, dword ptr [0x3e663]
            //   0f84a6000000         | or                  eax, 0xffffffff
            //   488d0d8d220400       | lock xadd           dword ptr [ecx], eax
            //   e8????????           |                     
            //   b9f4010000           | cmp                 eax, 1
            //   ff15????????         |                     

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules