SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato


As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2022-08-25SentinelOneJim Walter
@online{walter:20220825:bluesky:1d0f4f0, author = {Jim Walter}, title = {{BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar}}, date = {2022-08-25}, organization = {SentinelOne}, url = {https://www.sentinelone.com/blog/bluesky-ransomware-ad-lateral-movement-evasion-and-fast-encryption-puts-threat-on-the-radar/}, language = {English}, urldate = {2022-08-30} } BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky Cobalt Strike JuicyPotato
2022-01-17Trend MicroJoseph Chen, Kenney Lu, Gloria Chen, Jaromír Hořejší, Daniel Lunghi, Cedric Pernet
@techreport{chen:20220117:delving:4cd2b1c, author = {Joseph Chen and Kenney Lu and Gloria Chen and Jaromír Hořejší and Daniel Lunghi and Cedric Pernet}, title = {{Delving Deep: An Analysis of Earth Lusca’s Operations}}, date = {2022-01-17}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf}, language = {English}, urldate = {2022-07-25} } Delving Deep: An Analysis of Earth Lusca’s Operations
BIOPASS Cobalt Strike FunnySwitch JuicyPotato ShadowPad Winnti Earth Lusca
2021-08-09ESET ResearchZuzana Hromcová
@online{hromcov:20210809:iispy:c0b6ad3, author = {Zuzana Hromcová}, title = {{IISpy: A complex server‑side backdoor with anti‑forensic features}}, date = {2021-08-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/08/09/iispy-complex-server-side-backdoor-antiforensic-features/}, language = {English}, urldate = {2021-09-19} } IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05LIFARSLIFARS
@techreport{lifars:202005:xmrigbased:5e57232, author = {LIFARS}, title = {{XMRig-based CoinMinersby Blue Mockingbird Threat Actor}}, date = {2020-05}, institution = {LIFARS}, url = {https://lifars.com/wp-content/uploads/2020/06/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf}, language = {English}, urldate = {2020-06-19} } XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
@online{ohpe:20190114:juicy:d9ac671, author = {OHPE}, title = {{Juicy Potato (abusing the golden privileges)}}, date = {2019-01-14}, organization = {Github (ohpe)}, url = {https://github.com/ohpe/juicy-potato}, language = {English}, urldate = {2020-06-19} } Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20230715 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 488bcb e8???????? 837b1000 7514 488d05f7cb0300 483bd8 }
            // n = 6, score = 100
            //   488bcb               | mov                 dword ptr [esp + 0x40], eax
            //   e8????????           |                     
            //   837b1000             | test                eax, eax
            //   7514                 | inc                 ecx
            //   488d05f7cb0300       | mov                 eax, 0x1000
            //   483bd8               | dec                 eax

        $sequence_1 = { 488905???????? ff15???????? 488bc8 488d152e9c0100 }
            // n = 4, score = 100
            //   488905????????       |                     
            //   ff15????????         |                     
            //   488bc8               | arpl                bx, cx
            //   488d152e9c0100       | dec                 eax

        $sequence_2 = { 488bd9 488bc2 488d0d05950100 48890b }
            // n = 4, score = 100
            //   488bd9               | mov                 dword ptr [ecx], eax
            //   488bc2               | dec                 eax
            //   488d0d05950100       | mov                 dword ptr [ecx + 8], eax
            //   48890b               | dec                 eax

        $sequence_3 = { 4d8be1 33c0 498be8 4c8d0d8b6effff 4c8bea }
            // n = 5, score = 100
            //   4d8be1               | dec                 eax
            //   33c0                 | mov                 dword ptr [ebp - 0x39], eax
            //   498be8               | dec                 eax
            //   4c8d0d8b6effff       | mov                 dword ptr [ebp - 0x19], edx
            //   4c8bea               | dec                 eax

        $sequence_4 = { 488d0de1970100 ff15???????? 488bc8 488d1541180100 ff15???????? }
            // n = 5, score = 100
            //   488d0de1970100       | mov                 edi, ecx
            //   ff15????????         |                     
            //   488bc8               | dec                 eax
            //   488d1541180100       | mov                 dword ptr [ecx], eax
            //   ff15????????         |                     

        $sequence_5 = { 488d05763c0300 4889442450 b801000000 8705???????? }
            // n = 4, score = 100
            //   488d05763c0300       | dec                 eax
            //   4889442450           | mov                 ecx, eax
            //   b801000000           | dec                 eax
            //   8705????????         |                     

        $sequence_6 = { 4585e4 0f88be040000 41f7e4 8bc2 488d1528c1feff c1e803 89442448 }
            // n = 7, score = 100
            //   4585e4               | cmp                 eax, 1
            //   0f88be040000         | jbe                 0x951
            //   41f7e4               | dec                 eax
            //   8bc2                 | lea                 ecx, [esp + 0x20]
            //   488d1528c1feff       | dec                 eax
            //   c1e803               | lea                 edx, [0x1c1e2]
            //   89442448             | dec                 eax

        $sequence_7 = { eb1e f20f1005???????? f20f118530010000 0fb705???????? 66898538010000 488b15???????? 4885d2 }
            // n = 7, score = 100
            //   eb1e                 | mov                 ebx, ecx
            //   f20f1005????????     |                     
            //   f20f118530010000     | dec                 esp
            //   0fb705????????       |                     
            //   66898538010000       | lea                 ecx, [0x2dc39]
            //   488b15????????       |                     
            //   4885d2               | mov                 ecx, 4

        $sequence_8 = { 488bd9 488bc2 488d0dad400300 48890b 488d5308 33c9 48890a }
            // n = 7, score = 100
            //   488bd9               | mov                 byte ptr [ecx], 0
            //   488bc2               | inc                 ecx
            //   488d0dad400300       | inc                 ecx
            //   48890b               | dec                 eax
            //   488d5308             | inc                 ecx
            //   33c9                 | dec                 eax
            //   48890a               | sub                 edx, 1

        $sequence_9 = { 8b81d0000000 85c0 750d 488b8d98000000 e8???????? 90 488d0578a5ffff }
            // n = 7, score = 100
            //   8b81d0000000         | lea                 ecx, [esp + 0x58]
            //   85c0                 | dec                 eax
            //   750d                 | lea                 edx, [0x35a85]
            //   488b8d98000000       | dec                 eax
            //   e8????????           |                     
            //   90                   | lea                 ecx, [esp + 0x58]
            //   488d0578a5ffff       | dec                 eax

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules