← Back to SOC feed Coverage →

DebuggerCheck GlobalFlags

yara LOW Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-03-19T03:46:59Z · Confidence: medium

Hunt Hypothesis

The DebuggerCheck GlobalFlags rule detects potential attempts by adversaries to modify or bypass debugger detection mechanisms by altering global flags, which may indicate evasion of security controls. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential advanced persistent threats that are actively avoiding detection and persistence mechanisms.

YARA Rule

rule DebuggerCheck__GlobalFlags : AntiDebug DebuggerCheck {
	meta:
		weight = 1
		Author = "naxonez"
		reference = "https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara"
	strings:
		$ ="NtGlobalFlags"
	condition:
		any of them
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/antidebug_antivm/antidebug_antivm.yar