heroui logo

ProcessHacker Privilege Elevation

Sigma Rules

View Source
Summary
The 'ProcessHacker Privilege Elevation' detection rule is designed to identify instances where the ProcessHacker tool elevates privileges within a Windows system. ProcessHacker is a versatile tool commonly used for system monitoring and process management, but it can also be exploited for malicious purposes, particularly for privilege escalation attacks. This rule specifically targets events generated by the Service Control Manager (SCM) that indicate the installation of a service starting with 'ProcessHacker'. The detection leverages Windows Event ID 7045 which logs when a new service is installed. In this instance, the 'AccountName' must match 'LocalSystem', which is a common indicator of elevated privileges. The rule is tagged with relevant attack techniques from the MITRE ATT&CK framework related to execution and privilege escalation, indicating its relevance in a security operations context. False positives are deemed unlikely due to the specificity of the detection parameters.
Categories
  • Windows
  • Endpoint
Data Sources
  • Service
  • Logon Session
Created: 2021-05-27