heroui logo

Windows Time Based Evasion via Choice Exec

Splunk Security Content

View Source
Summary
This detection rule identifies the use of 'choice.exe' in batch files, a tactic associated with time-based evasion techniques employed by certain malware, specifically the SnakeKeylogger. When malware uses such techniques, it executes 'choice.exe' to intentionally introduce delays, which can help it bypass detection mechanisms. The rule leverages data from Endpoint Detection and Response (EDR) systems, particularly focusing on the process names and command-line arguments related to 'choice.exe'. The detection logic utilizes multiple event logs, including Sysmon EventID 1 and Windows Security Event Log 4688, to monitor instances of this behavior and potentially identify malicious intent behind these time delays. Investigating these alerts is crucial, as successful evasion can lead to further compromise, such as remote code execution, deletion of artifacts, or persistence on affected systems.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1497.003
  • T1497
Created: 2024-11-13