heroui logo

HackTool - PCHunter Execution

Sigma Rules

View Source
Summary
The rule detects suspicious executions of PCHunter, a tool similar to Process Hacker, designed for advanced process management and system manipulation. PCHunter is often used for legitimate purposes such as system monitoring or debugging, but it can also be exploited by attackers to gain unauthorized access to processes and manipulate system behavior. The detection is triggered by specific characteristics of the tool’s executions, including its image names, original file names, and known hash values. The rule is configured to activate on Windows systems during process creation events, specifically monitoring for instances of PCHunter binary files as they can indicate potential malicious activity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-10-10