Skip to content
Threat Feed
high advisory

Windows Potato Privilege Escalation Tool Execution

Detects the execution of known Potato-family privilege escalation tools on Windows systems, which are used to escalate privileges from restricted contexts to SYSTEM by exploiting Windows token impersonation and privilege abuse.

The “Potato” family of privilege escalation tools has been a prevalent method for attackers to escalate privileges on Windows systems for over a decade. These tools are actively used by ransomware operators, red teams, and nation-state actors. The core concept involves exploiting Windows token impersonation and privilege abuse. Attackers use these tools to escalate from a service account, IIS worker process, or other restricted context to SYSTEM. The primary attack vector involves tricking a SYSTEM-level process into authenticating to an attacker-controlled endpoint, capturing that authentication, and impersonating the resulting SYSTEM token to spawn an elevated process. Detection focuses on identifying specific file names, process names, or binary paths associated with known Potato variants.

Attack Chain

  1. Initial access is achieved through an existing vulnerability or compromise, placing the attacker in a low-privileged context such as a service account or IIS worker process.
  2. The attacker executes a Potato exploit (e.g., JuicyPotato.exe, RottenPotato.exe) on the compromised system.
  3. The Potato exploit leverages techniques like named pipes or RPC to coerce a high-privilege account (typically NT AUTHORITY\SYSTEM) to authenticate to a controlled endpoint.
  4. The exploit captures the authentication data, often through a rogue SMB server or similar mechanism.
  5. The captured authentication token is then impersonated by the Potato exploit.
  6. Using the impersonated SYSTEM token, the exploit spawns a new process with elevated privileges.
  7. The newly created process, running as SYSTEM, allows the attacker to perform administrative actions.
  8. The attacker gains full control over the system, allowing for lateral movement, data exfiltration, or other malicious objectives.

Impact

Successful exploitation leads to complete system compromise, as the attacker gains SYSTEM-level privileges. This allows them to perform any action on the system, including installing malware, accessing sensitive data, creating new accounts, and modifying system settings. The Potato family of exploits has been used in numerous high-profile attacks, impacting a wide range of organizations. The impact is especially severe in environments where vulnerable systems are critical infrastructure components.

Recommendation

  • Deploy the Windows Potato Privilege Escalation Tool Execution rule to your SIEM and tune for your environment based on observed activity.
  • Investigate any alerts generated by the Windows Potato Privilege Escalation Tool Execution rule, focusing on systems with unusual parent-child process relationships.
  • Implement application control policies to restrict the execution of unauthorized executables in sensitive system directories.
  • Regularly audit and patch systems to mitigate known vulnerabilities that could facilitate initial compromise.
  • Monitor process creation events for unusual parent-child process relationships, particularly those involving svchost.exe and cmd.exe or powershell.exe.

Detection coverage 2

Detect Potato Tool Execution via Original Filename

high

Detects execution of Potato privilege escalation tools by monitoring for specific original file names.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detect Potato Tool Execution via Process Path

high

Detects execution of Potato privilege escalation tools by monitoring process paths.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →