Create persistence_time_provider_mod.toml (#890)

This commit is contained in:
Brent Murphy
2021-01-25 14:42:56 -05:00
committed by GitHub
parent ecbb57814a
commit 7fdb6b2e80
@@ -0,0 +1,51 @@
[metadata]
creation_date = "2021/01/19"
maturity = "production"
updated_date = "2021/01/19"
[rule]
author = ["Elastic"]
description = """
Windows operating systems are utilizing the time provider architecture in order to obtain accurate time stamps from
other network devices or clients in the network. Time providers are implemented in the form of a DLL file which resides
in System32 folder. The service W32Time initiates during the startup of Windows and loads w32time.dll. Adversaries may
abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time
provider.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-endpoint.events.*"]
language = "eql"
license = "Elastic License"
name = "Potential Persistence via Time Provider Modification"
references = ["https://pentestlab.blog/2019/10/22/persistence-time-providers/"]
risk_score = 47
rule_id = "14ed1aa9-ebfd-4cf9-a463-0ac59ec55204"
severity = "medium"
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Persistence"]
type = "eql"
query = '''
registry where event.type:"change" and
registry.path:"HKLM\\SYSTEM\\*ControlSet*\\Services\\W32Time\\TimeProviders\\*" and
registry.data.strings:"*.dll"
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1547"
name = "Boot or Logon Autostart Execution"
reference = "https://attack.mitre.org/techniques/T1547/"
[[rule.threat.technique.subtechnique]]
id = "T1547.003"
name = "Time Providers"
reference = "https://attack.mitre.org/techniques/T1547/003/"
[rule.threat.tactic]
id = "TA0003"
name = "Persistence"
reference = "https://attack.mitre.org/tactics/TA0003/"