HackTool - LocalPotato Execution
Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples
Sigma rule (View on GitHub)
1title: HackTool - LocalPotato Execution
2id: 6bd75993-9888-4f91-9404-e1e4e4e34b77
3status: test
4description: Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples
5references:
6 - https://www.localpotato.com/localpotato_html/LocalPotato.html
7 - https://github.com/decoder-it/LocalPotato
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2023-02-14
10modified: 2024-11-23
11tags:
12 - attack.defense-evasion
13 - attack.privilege-escalation
14 - cve.2023-21746
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_img:
20 Image|endswith: '\LocalPotato.exe'
21 selection_cli:
22 CommandLine|contains|all:
23 - '.exe -i C:\'
24 - '-o Windows\'
25 selection_hash_plain:
26 Hashes|contains:
27 - 'IMPHASH=E1742EE971D6549E8D4D81115F88F1FC'
28 - 'IMPHASH=DD82066EFBA94D7556EF582F247C8BB5'
29 condition: 1 of selection_*
30falsepositives:
31 - Unlikely
32level: high
References
Related rules
- HackTool - CoercedPotato Execution
- HackTool - Impersonate Execution
- HackTool - UACMe Akagi Execution
- PUA - Process Hacker Execution
- PUA - System Informer Execution