Files
sigma-rules/rules/windows/persistence_time_provider_mod.toml
T
2021-03-03 22:12:11 -09:00

53 lines
1.7 KiB
TOML

[metadata]
creation_date = "2021/01/19"
maturity = "production"
updated_date = "2021/03/03"
[rule]
author = ["Elastic"]
description = """
Windows operating systems are utilizing the time provider architecture in order to obtain accurate time stamps from
other network devices or clients in the network. Time providers are implemented in the form of a DLL file which resides
in System32 folder. The service W32Time initiates during the startup of Windows and loads w32time.dll. Adversaries may
abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time
provider.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.*"]
language = "eql"
license = "Elastic License v2"
name = "Potential Persistence via Time Provider Modification"
references = ["https://pentestlab.blog/2019/10/22/persistence-time-providers/"]
risk_score = 47
rule_id = "14ed1aa9-ebfd-4cf9-a463-0ac59ec55204"
severity = "medium"
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Persistence"]
timestamp_override = "event.ingested"
type = "eql"
query = '''
registry where event.type:"change" and
registry.path:"HKLM\\SYSTEM\\*ControlSet*\\Services\\W32Time\\TimeProviders\\*" and
registry.data.strings:"*.dll"
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1547"
name = "Boot or Logon Autostart Execution"
reference = "https://attack.mitre.org/techniques/T1547/"
[[rule.threat.technique.subtechnique]]
id = "T1547.003"
name = "Time Providers"
reference = "https://attack.mitre.org/techniques/T1547/003/"
[rule.threat.tactic]
id = "TA0003"
name = "Persistence"
reference = "https://attack.mitre.org/tactics/TA0003/"