SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato


As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2022-08-25SentinelOneJim Walter
@online{walter:20220825:bluesky:1d0f4f0, author = {Jim Walter}, title = {{BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar}}, date = {2022-08-25}, organization = {SentinelOne}, url = {https://www.sentinelone.com/blog/bluesky-ransomware-ad-lateral-movement-evasion-and-fast-encryption-puts-threat-on-the-radar/}, language = {English}, urldate = {2022-08-30} } BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky Cobalt Strike JuicyPotato
2022-01-17Trend MicroJoseph Chen, Kenney Lu, Gloria Chen, Jaromír Hořejší, Daniel Lunghi, Cedric Pernet
@techreport{chen:20220117:delving:4cd2b1c, author = {Joseph Chen and Kenney Lu and Gloria Chen and Jaromír Hořejší and Daniel Lunghi and Cedric Pernet}, title = {{Delving Deep: An Analysis of Earth Lusca’s Operations}}, date = {2022-01-17}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf}, language = {English}, urldate = {2022-07-25} } Delving Deep: An Analysis of Earth Lusca’s Operations
BIOPASS Cobalt Strike FunnySwitch JuicyPotato ShadowPad Winnti Earth Lusca
2021-08-09ESET ResearchZuzana Hromcová
@online{hromcov:20210809:iispy:c0b6ad3, author = {Zuzana Hromcová}, title = {{IISpy: A complex server‑side backdoor with anti‑forensic features}}, date = {2021-08-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/08/09/iispy-complex-server-side-backdoor-antiforensic-features/}, language = {English}, urldate = {2021-09-19} } IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05LIFARSLIFARS
@techreport{lifars:202005:xmrigbased:5e57232, author = {LIFARS}, title = {{XMRig-based CoinMinersby Blue Mockingbird Threat Actor}}, date = {2020-05}, institution = {LIFARS}, url = {https://lifars.com/wp-content/uploads/2020/06/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf}, language = {English}, urldate = {2020-06-19} } XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
@online{ohpe:20190114:juicy:d9ac671, author = {OHPE}, title = {{Juicy Potato (abusing the golden privileges)}}, date = {2019-01-14}, organization = {Github (ohpe)}, url = {https://github.com/ohpe/juicy-potato}, language = {English}, urldate = {2020-06-19} } Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20230125 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 488d056bd10100 488bd9 488901 f6c201 740a ba10000000 e8???????? }
            // n = 7, score = 100
            //   488d056bd10100       | and                 dword ptr [esp + 0x28], 0
            //   488bd9               | dec                 eax
            //   488901               | lea                 eax, [0xfffeee45]
            //   f6c201               | shl                 edi, cl
            //   740a                 | inc                 ecx
            //   ba10000000           | mov                 eax, dword ptr [esi + ebx*4]
            //   e8????????           |                     

        $sequence_1 = { 732a 4863d1 488d0d3c030400 488bc2 83e23f 48c1f806 48c1e206 }
            // n = 7, score = 100
            //   732a                 | mov                 dword ptr [esp + 0x40], ebx
            //   4863d1               | dec                 eax
            //   488d0d3c030400       | mov                 dword ptr [esp + 0x48], ebp
            //   488bc2               | dec                 eax
            //   83e23f               | mov                 dword ptr [esp + 0x58], esi
            //   48c1f806             | dec                 eax
            //   48c1e206             | mov                 esi, edx

        $sequence_2 = { 488905???????? ff15???????? 483305???????? 488d15603b0300 488bcb 488905???????? ff15???????? }
            // n = 7, score = 100
            //   488905????????       |                     
            //   ff15????????         |                     
            //   483305????????       |                     
            //   488d15603b0300       | dec                 eax
            //   488bcb               | lea                 edx, [0x28d87]
            //   488905????????       |                     
            //   ff15????????         |                     

        $sequence_3 = { 4d896e48 45896e20 41c7462401000000 48899c24b8080000 }
            // n = 4, score = 100
            //   4d896e48             | lea                 eax, [ebp - 0x29]
            //   45896e20             | dec                 eax
            //   41c7462401000000     | mov                 dword ptr [ebp - 9], eax
            //   48899c24b8080000     | dec                 eax

        $sequence_4 = { e8???????? 488d152fdd0200 488d8c2488000000 e8???????? 90 488bc7 4c8d9c24b0000000 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   488d152fdd0200       | dec                 eax
            //   488d8c2488000000     | mov                 dword ptr [edx], ecx
            //   e8????????           |                     
            //   90                   | dec                 eax
            //   488bc7               | mov                 dword ptr [edx + 8], ecx
            //   4c8d9c24b0000000     | dec                 eax

        $sequence_5 = { 90 488d05f62e0200 488907 488b5c2440 }
            // n = 4, score = 100
            //   90                   | mov                 dword ptr [esp + 0x20], 1
            //   488d05f62e0200       | dec                 eax
            //   488907               | lea                 ecx, [0xfffebbfb]
            //   488b5c2440           | dec                 eax

        $sequence_6 = { 89442440 e8???????? 4c8b03 488bd0 }
            // n = 4, score = 100
            //   89442440             | mov                 dword ptr [ebx], ecx
            //   e8????????           |                     
            //   4c8b03               | dec                 eax
            //   488bd0               | lea                 edx, [ebx + 8]

        $sequence_7 = { ff15???????? 48832300 4883c308 488d0509850400 483bd8 75d8 4883c420 }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   48832300             | dec                 eax
            //   4883c308             | lea                 edx, [0xfffeb8cb]
            //   488d0509850400       | inc                 esp
            //   483bd8               | mov                 dword ptr [esp + 0x40], esp
            //   75d8                 | jne                 0xfffffd72
            //   4883c420             | mov                 ecx, dword ptr [esp + 0x44]

        $sequence_8 = { 488d4de0 e8???????? 488d15b6390300 488d4de0 e8???????? }
            // n = 5, score = 100
            //   488d4de0             | shr                 si, 1
            //   e8????????           |                     
            //   488d15b6390300       | dec                 ecx
            //   488d4de0             | mov                 ecx, esp
            //   e8????????           |                     

        $sequence_9 = { 488d442444 c74424443f000000 4889442428 4c8d442450 }
            // n = 4, score = 100
            //   488d442444           | lea                 eax, [0x426a4]
            //   c74424443f000000     | and                 edx, 0x3f
            //   4889442428           | dec                 eax
            //   4c8d442450           | mov                 eax, ecx

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules