← Back to SOC feed Coverage →

Suspicious PROCEXP152.sys File Created In TMP

sigma MEDIUM SigmaHQ
T1562.001
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

The detection of the PROCEXP152.sys file in the TMP directory may indicate the presence of malicious tools leveraging this driver for persistence or privilege escalation. SOC teams should proactively hunt for this behavior as it could signal the use of advanced persistence mechanisms or unauthorized tooling in their Azure Sentinel environment.

Detection Rule

Sigma (Original)

title: Suspicious PROCEXP152.sys File Created In TMP
id: 3da70954-0f2c-4103-adff-b7440368f50e
status: test
description: |
  Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder.
  This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.
references:
    - https://web.archive.org/web/20230331181619/https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
author: xknow (@xknow_infosec), xorxes (@xor_xes)
date: 2019-04-08
modified: 2022-11-22
tags:
    - attack.t1562.001
    - attack.defense-evasion
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|contains: '\AppData\Local\Temp\'
        TargetFilename|endswith: 'PROCEXP152.sys'
    filter:
        Image|contains:
            - '\procexp64.exe'
            - '\procexp.exe'
            - '\procmon64.exe'
            - '\procmon.exe'
    condition: selection and not filter
falsepositives:
    - Other legimate tools using this driver and filename (like Sysinternals). Note - Clever attackers may easily bypass this detection by just renaming the driver filename. Therefore just Medium-level and don't rely on it.
level: medium

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName contains "\\AppData\\Local\\Temp\\" and TargetFileName endswith "PROCEXP152.sys") and (not((TargetFilePath contains "\\procexp64.exe" or TargetFilePath contains "\\procexp.exe" or TargetFilePath contains "\\procmon64.exe" or TargetFilePath contains "\\procmon.exe")))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_susp_procexplorer_driver_created_in_tmp_folder.yml