Files
hayabusa/rules/sigma/builtin/security/win_susp_time_modification.yml
itiB 83d891b2fa Feature/rm submodule (#312)
* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
2021-12-20 21:14:32 +09:00

41 lines
1.3 KiB
YAML

title: Unauthorized System Time Modification
ruletype: Sigma
author: '@neu5ron'
date: 2019/02/05
description: Detect scenarios where a potentially unauthorized application or user
is modifying the system time.
detection:
SELECTION_1:
EventID: 4616
SELECTION_2:
ProcessName:
- C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
- C:\Windows\System32\VBoxService.exe
SELECTION_3:
ProcessName: C:\Windows\System32\svchost.exe
SELECTION_4:
SubjectUserSid: S-1-5-19
condition: (SELECTION_1 and not ((SELECTION_2) or (SELECTION_3 and SELECTION_4)))
falsepositives:
- HyperV or other virtualization technologies with binary not listed in filter portion
of detection
id: faa031b5-21ed-4e02-8881-2591f98d82ed
level: medium
logsource:
definition: 'Requirements: Audit Policy : System > Audit Security State Change,
Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced
Audit Policy Configuration\Audit Policies\System\Audit Security State Change'
product: windows
service: security
modified: 2021/11/27
references:
- Private Cuckoo Sandbox (from many years ago, no longer have hash, NDA as well)
- Live environment caused by malware
- https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4616
status: test
tags:
- attack.defense_evasion
- attack.t1099
- attack.t1070.006