ATT&CK coverage › Technique

Debugger Evasion T1622

Adversaries may employ various means to detect and avoid debuggers. Debuggers are typically used by defenders to trace and/or analyze the execution of potential malware payloads.

Events covered

1 catalog event are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon1Process creation

Authoring guide

Patterns shared across the 1 rule above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (5 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
Image1match 1, ends_with 1\ProcessHacker_, \ProcessHacker.exe
Product1eq 1Process Hacker
Hashes1match 1SHA256=D4A0FE56316A2C45B9BA9AC1005363309A3EDC7ACF9E4DF64D..., SHA1=A0BDFAC3CE1880B32FF9B696458327CE352E3B1D, SHA1=C5E2018BF7C0F314FED4FD7FE7E69FA2E648359E
Description1eq 1Process Hacker
OriginalFileName1eq 1ProcessHacker.exe, Process Hacker

Top indicator values (14 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
HashesmatchIMPHASH=04DE0AD9C37EB7BD52043D2ECAC958DF1
HashesmatchMD5=B365AF317AE730A67C936F21432B9C711
HashesmatchSHA1=A0BDFAC3CE1880B32FF9B696458327CE352E3B1D1
HashesmatchIMPHASH=3695333C60DEDECDCAFF1590409AA4621
HashesmatchSHA1=C5E2018BF7C0F314FED4FD7FE7E69FA2E648359E1
Imageends_with\ProcessHacker.exe1
HashesmatchMD5=68F9B52895F4D34E74112F3129B3B00D1
OriginalFileNameeqProcess Hacker1
HashesmatchSHA256=BD2C2CF0631D881ED382817AFCCE2B093F4E412FFB170A719E2762F250ABFEA41
Imagematch\ProcessHacker_1
DescriptioneqProcess Hacker1
ProducteqProcess Hacker1
OriginalFileNameeqProcessHacker.exe1
HashesmatchSHA256=D4A0FE56316A2C45B9BA9AC1005363309A3EDC7ACF9E4DF64D326A0FF273E80F1

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 1 rule