(YARA) Detect NtQueryObject Usage
rule Detect_NtQueryObject: AntiDebug {
meta:
description = "Detect NtQueryObject as anti-debug"
author = "Unprotect"
comment = "Experimental rule"
strings:
$1 = "NtQueryObject" fullword ascii
condition:
uint16(0) == 0x5A4D and filesize < 1000KB and $1
}
Associated Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) |
|---|---|---|---|
| NtQueryObject | U0118 B0001.013 |
|
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| rootkit.exe | 10 | 2026-03-24 | 1 week, 1 day ago |
| al-khaser.exe | 24 | 2024-11-13 | 1 year, 4 months ago |
Created
June 22, 2022
Last Revised
March 27, 2026