17 lines
669 B
YAML
17 lines
669 B
YAML
attack_technique: T1622
|
|
display_name: Debugger Evasion
|
|
atomic_tests:
|
|
- name: Detect a Debugger Presence in the Machine
|
|
auto_generated_guid: 58bd8c8d-3a1a-4467-a69c-439c75469b07
|
|
description: Detecting a running debugger process or if the debugger is attached to a process via PowerShell
|
|
supported_platforms:
|
|
- windows
|
|
executor:
|
|
command: |-
|
|
# Check for common debugger processes
|
|
$debuggerProcesses = Get-Process | Where-Object { $_.ProcessName -match "dbg" -or $_.ProcessName -match "debug" }
|
|
# Check for debugging flags
|
|
$debuggingFlags = [System.Diagnostics.Debugger]::IsAttached
|
|
name: powershell
|
|
elevation_required: true
|