> Windows Syscalls
ntoskrnl.exeT1055.003T1003.001T1106

NtSuspendThread

Increments the suspend count of a target thread, halting its execution.

Prototype

NTSTATUS NtSuspendThread(
  HANDLE  ThreadHandle,
  PULONG  PreviousSuspendCount
);

Arguments

NameTypeDirDescription
ThreadHandleHANDLEinHandle to the thread to suspend. Must have THREAD_SUSPEND_RESUME access.
PreviousSuspendCountPULONGoutOptional pointer that receives the suspend count before the call.

Syscall IDs by Windows version

Windows versionSyscall IDBuild
Win10 15070x1A0win10-1507
Win10 16070x1A9win10-1607
Win10 17030x1AFwin10-1703
Win10 17090x1B2win10-1709
Win10 18030x1B4win10-1803
Win10 18090x1B5win10-1809
Win10 19030x1B6win10-1903
Win10 19090x1B6win10-1909
Win10 20040x1BCwin10-2004
Win10 20H20x1BCwin10-20h2
Win10 21H10x1BCwin10-21h1
Win10 21H20x1BEwin10-21h2
Win10 22H20x1BEwin10-22h2
Win11 21H20x1C8win11-21h2
Win11 22H20x1CCwin11-22h2
Win11 23H20x1CCwin11-23h2
Win11 24H20x1CFwin11-24h2
Server 20160x1A9winserver-2016
Server 20190x1B5winserver-2019
Server 20220x1C4winserver-2022
Server 20250x1CFwinserver-2025

Kernel module

ntoskrnl.exeNtSuspendThread

Related APIs

SuspendThreadWow64SuspendThreadNtResumeThreadNtGetContextThreadNtSetContextThreadNtSuspendProcess

Syscall stub

4C 8B D1            mov r10, rcx
B8 CF 01 00 00      mov eax, 0x1CF
F6 04 25 08 03 FE 7F 01   test byte ptr [0x7FFE0308], 1
75 03               jne short +3
0F 05               syscall
C3                  ret
CD 2E               int 2Eh
C3                  ret

Undocumented notes

NtSuspendThread is the kernel primitive behind SuspendThread / Wow64SuspendThread. Its SSN drifts heavily across builds because it lives in the upper, alphabetically-sorted region of the System Service Descriptor Table — every new syscall inserted earlier shifts it. Each successful call increments the kernel-tracked suspend count (KTHREAD->SuspendCount); the thread only resumes when the count returns to zero via matching NtResumeThread calls. The routine ultimately funnels into KeSuspendThread / PsSuspendThread inside ntoskrnl.exe.

Common malware usage

Two dominant abuse patterns. First: thread hijacking — suspend an existing thread, NtGetContextThread, rewrite RIP/RSP to point at shellcode, NtSetContextThread, NtResumeThread (T1055.003). Second, and increasingly common: suspending EDR/AV scanning threads inside the same or a remote process to win a race. Variants (NanoDump style) suspend all threads of lsass.exe before reading memory to obtain a coherent snapshot without triggering thread-creation telemetry. Used by Cobalt Strike's `inject` BOF flavours, Sliver's process-hollowing payloads, and most modern process-doppelganging / ghosting loaders.

Detection opportunities

NtSuspendThread on a remote thread is rare and high-signal — legitimate suspenders are debuggers, profilers, .NET GC, and a small set of compatibility shims. Sysmon does not natively log it; capture via ETW-TI (Microsoft-Windows-Threat-Intelligence: EtwTiLogSuspendThread) or via a kernel callback (ObRegisterCallbacks on thread handles with THREAD_SUSPEND_RESUME). Cross-process suspends targeting security product threads (MsMpEng.exe, Sense.exe, cylancesvc.exe) should be alerted with high confidence. EDR user-mode hooks on ntdll!NtSuspendThread are commonly bypassed via direct/indirect syscalls — kernel telemetry is the reliable path.

Direct syscall examples

asmx64 direct stub (Win11 24H2)

; SSN 0x1CF on Win11 24H2 — do NOT hardcode across builds.
NtSuspendThread PROC
    mov  r10, rcx          ; ThreadHandle
    mov  eax, 1CFh
    syscall
    ret
NtSuspendThread ENDP

cSuspend-all before LSASS dump

// Snapshot all threads in target, suspend each, then read memory.
// Mirrors NanoDump / HandleKatz technique.
HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPTHREAD, 0);
THREADENTRY32 te = { .dwSize = sizeof(te) };
for (BOOL ok = Thread32First(hSnap, &te); ok; ok = Thread32Next(hSnap, &te)) {
    if (te.th32OwnerProcessID != lsassPid) continue;
    HANDLE hT = NtOpenThread_direct(THREAD_SUSPEND_RESUME, te.th32ThreadID);
    if (hT) { NtSuspendThread_direct(hT, NULL); CloseHandle(hT); }
}

rustNaked syscall (windows-sys 0.59)

use std::arch::asm;

#[unsafe(naked)]
unsafe extern "system" fn nt_suspend_thread_stub() {
    asm!(
        "mov r10, rcx",
        "mov eax, 0x1CF",   // Win11 24H2 only
        "syscall",
        "ret",
        options(noreturn),
    );
}

MITRE ATT&CK mappings

Last verified: 2026-05-20