heroui logo

PUA - Process Hacker Driver Load

Sigma Rules

View Source
Summary
This detection rule is designed to identify the loading of the Process Hacker driver (kprocesshacker.sys), which is associated with potential privilege escalation attacks. The rule monitors Windows systems for specific driver load events that include this driver and utilizes known Import Hashes (IMPHASH) to verify its legitimacy. The detection is triggered when the specified driver path ends with '\kprocesshacker.sys' or matches any of the predefined hashes. False positives can occur when legitimate system administrators or developers use Process Hacker for troubleshooting purposes. Therefore, it is crucial to assess the context in which this driver is loaded to avoid misidentifying legitimate administrative activities as malicious behavior.
Categories
  • Windows
Data Sources
  • Driver
Created: 2022-11-16