← Back to SOC feed Coverage →

DebuggerException SetConsoleCtrl

yara LOW Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-03-19T03:46:59Z · Confidence: medium

Hunt Hypothesis

The DebuggerException SetConsoleCtrl rule detects potential adversary attempts to bypass debugger detection by intercepting console control signals, which may indicate evasion of debugging and analysis tools. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential malware that is actively resisting forensic analysis and persistence mechanisms.

YARA Rule

rule DebuggerException__SetConsoleCtrl : AntiDebug DebuggerException {
	meta:
		weight = 1
		Author = "naxonez"
		reference = "https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara"
	strings:
		$ ="SetConsoleCtrlHandler"
	condition:
		any of them
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/antidebug_antivm/antidebug_antivm.yar