Token Impersonation via SeImpersonatePrivilege
Metasploit Meterpreter pattern detected: process executing in SYSTEM context via token impersonation using a named pipe exploit. The attack exploited a vulnerable service with SeImpersonatePrivilege to intercept a SYSTEM token through a named pipe connection. This technique, known as Potato attack variants, is frequently used to escalate from service account to SYSTEM privileges.