Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
Boot or Logon Autostart Execution: Time Providers (T1547.003) |
Severity |
Medium |
Description
The endpoint time provider has been tampered, this change may be used to gain persistence on the host by loading libraries into the time management service.
Attacker's Goals
Gain persistence using the legitimate windows time provider mechanism, which loads libraries into Windows services.
Investigative actions
- Verify if the registered library is malicious.
- Check if the installing software is a malicious binary.
- Check for any network activity from a "svchost.exe -k LocalService" process that seems suspicious.
Variations
Suspicious time provider registered manually by reg.exeSuspicious time provider registered using an uncommon provider name