EXPLORE
← Back to Explore
sigmahighHunting

RottenPotato Like Attack Pattern

Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like

MITRE ATT&CK

collectionprivilege-escalationcredential-access

Detection Query

selection:
  EventID: 4624
  LogonType: 3
  TargetUserName: ANONYMOUS LOGON
  WorkstationName: "-"
  IpAddress:
    - 127.0.0.1
    - ::1
condition: selection

Author

@SBousseaden, Florian Roth

Created

2019-11-15

Data Sources

windowssecurity

Platforms

windows

Tags

attack.collectionattack.privilege-escalationattack.credential-accessattack.t1557.001
Raw Content
title: RottenPotato Like Attack Pattern
id: 16f5d8ca-44bd-47c8-acbe-6fc95a16c12f
status: test
description: Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like
references:
    - https://twitter.com/SBousseaden/status/1195284233729777665
author: '@SBousseaden, Florian Roth'
date: 2019-11-15
modified: 2022-12-22
tags:
    - attack.collection
    - attack.privilege-escalation
    - attack.credential-access
    - attack.t1557.001
logsource:
    product: windows
    service: security
detection:
    selection:
        EventID: 4624
        LogonType: 3
        TargetUserName: 'ANONYMOUS LOGON'
        WorkstationName: '-'
        IpAddress:
            - '127.0.0.1'
            - '::1'
    condition: selection
falsepositives:
    - Unknown
level: high