Suspicious time provider registered

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution: Time Providers (T1547.003)

Severity

Medium

Description

The endpoint time provider has been tampered, this change may be used to gain persistence on the host by loading libraries into the time management service.

Attacker's Goals

Gain persistence using the legitimate windows time provider mechanism, which loads libraries into Windows services.

Investigative actions

  • Verify if the registered library is malicious.
  • Check if the installing software is a malicious binary.
  • Check for any network activity from a "svchost.exe -k LocalService" process that seems suspicious.

Variations

Suspicious time provider registered manually by reg.exe

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution: Time Providers (T1547.003)

Severity

High

Description

The endpoint time provider has been tampered, this change may be used to gain persistence on the host by loading libraries into the time management service.

Attacker's Goals

Gain persistence using the legitimate windows time provider mechanism, which loads libraries into Windows services.

Investigative actions

  • Verify if the registered library is malicious.
  • Check if the installing software is a malicious binary.
  • Check for any network activity from a "svchost.exe -k LocalService" process that seems suspicious.


Suspicious time provider registered using an uncommon provider name

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution: Time Providers (T1547.003)

Severity

High

Description

The endpoint time provider has been tampered, this change may be used to gain persistence on the host by loading libraries into the time management service.

Attacker's Goals

Gain persistence using the legitimate windows time provider mechanism, which loads libraries into Windows services.

Investigative actions

  • Verify if the registered library is malicious.
  • Check if the installing software is a malicious binary.
  • Check for any network activity from a "svchost.exe -k LocalService" process that seems suspicious.