PUA - Process Hacker Execution
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the execution of Process Hacker based on binary metadata information (Image, Hash, Imphash, etc). Process Hacker is a tool to view and manipulate processes, kernel options and other low level options. Threat actors abused older vulnerable versions to manipulate system processes.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND PROCESSNAME contains "\ProcessHacker_" OR PROCESSNAME endswith "\ProcessHacker.exe" OR ORIGINALFILENAME = "ProcessHacker.exe,Process Hacker" OR MESSAGE = "Process Hacker" OR PRODUCT_NAME = "Process Hacker" OR HASHES contains "MD5=68F9B52895F4D34E74112F3129B3B00D,MD5=B365AF317AE730A67C936F21432B9C71,SHA1=A0BDFAC3CE1880B32FF9B696458327CE352E3B1D,SHA1=C5E2018BF7C0F314FED4FD7FE7E69FA2E648359E,SHA256=D4A0FE56316A2C45B9BA9AC1005363309A3EDC7ACF9E4DF64D326A0FF273E80F,SHA256=BD2C2CF0631D881ED382817AFCCE2B093F4E412FFB170A719E2762F250ABFEA4,IMPHASH=3695333C60DEDECDCAFF1590409AA462,IMPHASH=04DE0AD9C37EB7BD52043D2ECAC958DF" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Florian Roth (Nextron Systems)


