(YARA) Detect NtQueryInformationProcess Usage
rule Detect_NtQueryInformationProcess: AntiDebug {
meta:
description = "Detect NtQueryInformationProcess as anti-debug"
author = "Unprotect"
comment = "Experimental rule"
strings:
$1 = "NtQueryInformationProcess" fullword ascii
condition:
uint16(0) == 0x5A4D and filesize < 1000KB and $1
}
Associated Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) |
|---|---|---|---|
| NtQueryInformationProcess | U0120 B0001.012 |
|
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| rootkit.exe | 10 | 2026-03-24 | 4 days, 2 hours ago |
| main.exe | 11 | 2026-02-07 | 1 month, 3 weeks ago |
| main.exe | 7 | 2026-02-03 | 1 month, 3 weeks ago |
| cmd.exe | 7 | 2025-12-10 | 3 months, 2 weeks ago |
| MSBuild.exe | 10 | 2024-11-15 | 9 months, 2 weeks ago |
| RuntimeBroker.exe | 11 | 2025-06-05 | 9 months, 3 weeks ago |
| TCS30Autoplay_Net.exe | 6 | 2025-04-25 | 11 months ago |
| RustPatchlessCLRLoader.exe | 8 | 2025-03-07 | 1 year ago |
| EternelSuspention.exe | 8 | 2024-12-05 | 1 year, 3 months ago |
| 1445a6fae415ff8b97807309ed6d...29636ba6a100dbcf3e3e04924790 | 7 | 2024-11-19 | 1 year, 4 months ago |
Created
June 22, 2022
Last Revised
March 27, 2026