heroui logo

HackTool - CoercedPotato Execution

Sigma Rules

View Source
Summary
The 'HackTool - CoercedPotato Execution' detection rule identifies the execution of CoercedPotato, a well-known tool used for privilege escalation on Windows systems. This rule focuses on detecting specific indicators such as the executable name 'CoercedPotato.exe' in process creation events, certain command line arguments that include '--exploitId', and specific Import Hashes (IMPHASHes) associated with this tool. By monitoring for these criteria, the rule aims to provide visibility into activities related to privilege escalation attempts facilitated by CoercedPotato. The detection logic applies conditions ensuring that any process creation matching these criteria triggers an alert. Given its high-risk nature, it's imperative to implement this rule in environments monitoring for threat actors attempting to elevate their privileges stealthily. False positives are currently unknown, indicating ongoing testing and refinement of the rule.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
Created: 2023-10-11