(YARA) YARA_Detect_NtQueryInformationProcess
rule Detect_NtQueryInformationProcess: AntiDebug {
meta:
description = "Detect NtQueryInformationProcess as anti-debug"
author = "Unprotect"
comment = "Experimental rule"
strings:
$1 = "NtQueryInformationProcess" fullword ascii
condition:
uint16(0) == 0x5A4D and filesize < 1000KB and $1
}
Associated Techniques
| Technique Name | Technique ID's | Snippet(s) | OS |
|---|---|---|---|
| NtQueryInformationProcess | U0120 B0001.012 |
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| MSBuild.exe | 10 | 2024-11-15 | 4 months, 2 weeks ago |
| RuntimeBroker.exe | 11 | 2025-06-05 | 4 months, 3 weeks ago |
| TCS30Autoplay_Net.exe | 6 | 2025-04-25 | 6 months ago |
| RustPatchlessCLRLoader.exe | 8 | 2025-03-07 | 7 months, 3 weeks ago |
| EternelSuspention.exe | 8 | 2024-12-05 | 10 months, 3 weeks ago |
| 1445a6fae415ff8b97807309ed6d...29636ba6a100dbcf3e3e04924790 | 7 | 2024-11-19 | 11 months, 1 week ago |
| al-khaser.exe | 24 | 2024-11-13 | 11 months, 2 weeks ago |
Created
June 22, 2022
Last Revised
June 22, 2022