LoFP LoFP / t1564

t1564

TitleTags
- false positives are expected from legitimate system administrator scripts or installation utilities. filter known parent image and commandline combinations.
- mcafee related services changes are a known false positive. the sc.exe utility is used to deny groups such as authenticated users, built-in administrators and system access to certain permissions.
administrative or software activity
applications could use this notation occasionally which might generate some false positives. in that case investigate the parent and child process.
certain tools may create hidden temporary directories upon installation or as part of their normal behavior. these events can be filtered by the process arguments, username, or process name values.
certain tools may create hidden temporary files or directories upon installation or as part of their normal behavior. these events can be filtered by the process arguments, username, or process name values.
igfxcuiservice.exe hiding *.cui files via .bat script (attrib.exe a child of cmd.exe and igfxcuiservice.exe is the parent of the cmd.exe)
legitimate administration activities
legitimate administrative action
legitimate administrative scripts running from temporary folders.
legitimate administrative use
legitimate disabling of crashdumps
legitimate powershell scripts
legitimate usage of chflags by administrators and users.
msiexec.exe hiding desktop.ini
niche software updaters utilizing hidden batch files in programdata.
software installers
some false positives might occur with binaries download via github
system administrator activities
system informer is regularly used legitimately by system administrators or developers. apply additional filters accordingly
this may have false positives on hosts where virtualbox is legitimately being used for operations
this rule isn't looking for any particular binary characteristics. as legitimate installers and programs were seen embedding hidden binaries in their ads. some false positives are expected from browser processes and similar.
unknown
unlikely
very possible
while sometimes 'process hacker is used by legitimate administrators, the execution of process hacker must be investigated and allowed on a case by case basis