PUA - Process Hacker Driver Load

Detects driver load of the Process Hacker tool

Sigma rule (View on GitHub)

 1title: PUA - Process Hacker Driver Load
 2id: 67add051-9ee7-4ad3-93ba-42935615ae8d
 3related:
 4    - id: 10cb6535-b31d-4512-9962-513dcbc42cc1
 5      type: similar
 6status: test
 7description: Detects driver load of the Process Hacker tool
 8references:
 9    - https://processhacker.sourceforge.io/
10author: Florian Roth (Nextron Systems)
11date: 2022-11-16
12modified: 2024-11-23
13tags:
14    - attack.privilege-escalation
15    - cve.2021-21551
16    - attack.t1543
17logsource:
18    category: driver_load
19    product: windows
20detection:
21    selection:
22        - ImageLoaded|endswith: '\kprocesshacker.sys'
23        - Hashes|contains:
24              - 'IMPHASH=821D74031D3F625BCBD0DF08B70F1E77'
25              - 'IMPHASH=F86759BB4DE4320918615DC06E998A39'
26              - 'IMPHASH=0A64EEB85419257D0CE32BD5D55C3A18'
27              - 'IMPHASH=6E7B34DFC017700B1517B230DF6FF0D0'
28    condition: selection
29falsepositives:
30    - Legitimate use of process hacker or system informer by developers or system administrators
31level: high

References

Related rules

to-top