heroui logo

Use of W32tm as Timer

Sigma Rules

View Source
Summary
This detection rule is designed to identify the potential misuse of the Windows Time Service command-line tool, w32tm.exe, when utilized as a timer or delay mechanism. The rule specifies that when w32tm is executed with specific command line arguments, it can serve as a means to create delays for malicious purposes, such as obfuscating the execution of malicious payloads or synchronizing activities in an attack. The detection logic focuses on the process creation events that involve w32tm.exe, with particular attention to command line parameters that indicate its use as a timing mechanism (e.g., /stripchart, /computer:, /period:, /dataonly, /samples:). High threat levels are assigned due to the possibility of exploitation in advanced persistent threats (APTs) and other attack scenarios where timing is strategically crucial. This rule helps defenders to detect timely suspicious activities that leverage legitimate system tools for malicious end goals.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1124
Created: 2022-09-25