It's really hard to make absolute statements about performance in this case, because it depends on the environment. Let's look at a couple of common hash functions: SHA-2 variants, SHA-3 variants, and BLAKE2b.
All three of these use different constructions: SHA-2 is Merkle-Dåmgard, SHA-3 is a sponge, and BLAKE2b is HAIFA-like. In SHA-256, we process 64 bytes at a time; in SHA-3-256, we process 136 bytes at a time; and in BLAKE2b, we process 128 bytes at a time. By "at a time", we mean in each iteration of the compression function, which in SHA-3 is the Keccak permutation.
However, which algorithm is the fastest depends on the implementation. On many modern machines, SHA-256 is implemented in hardware, and it is the fastest choice. When we're working entirely in software, BLAKE2b tends to be the fastest choice because it's internal operations are highly parallelizable, much like the ChaCha stream cipher on which it's based. SHA-3-256 is usually the slowest algorithm in terms of cycles per byte in software, even considering the fact that it processes the most data at once. That's in part because it has the largest state and therefore it typically does more work to adequately mix the data.
Ironically, in software, SHA-384 and SHA-512 are typically faster for most messages than SHA-256 on 64-bit machines because they process twice as much data at once with 5/4 the operations, but that's because the internal operations are almost completely identical, just on different word sizes (and with different constants). This is not true on modern x86-64 machines because SHA-256 is hardware accelerated and SHA-512 is not.
Overall, it's really hard to make a 100% judgment about performance without actually measuring. Any of SHA-2, SHA-3, or BLAKE2 are sound, acceptable choices if you don't need to protect against length-extension attacks. For cases where you do, I like BLAKE2b because it's generally very fast on 64-bit machines and secure. However, sometimes people need to pick from only certain approved algorithms (e.g., FIPS), and so SHA-3 is a good choice. If performance matters to you, construct a performance test on real data in your workload to determine which of the secure options works for you. However, don't use MD5 or SHA-1, since they're insecure.