heroui logo

Unauthorized System Time Modification

Sigma Rules

View Source
Summary
This detection rule is designed to identify unauthorized modifications to the system time on Windows-based systems. The core event being monitored is Event ID 4616, which records when the system time has been changed. This change could indicate malicious activities, such as evasion of security measures or manipulation of timestamps for fraudulent activities. The rule includes specific filters to ignore benign processes typically involved in system time changes, such as those from VMware and Microsoft utilities. A focus area is to catch alterations initiated by unauthorized applications or users, specifically excluding legitimate changes from defined processes. The low severity level suggests that while the detection is important, it may not always indicate a critical threat on its own. However, further investigation is recommended if the event occurs without the intervention of specified processes. The author highlights potential false positives from virtualization technologies which may also trigger similar events. Overall, this rule is a preventive measure against time tampering, critical for maintaining accurate logs and security states.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
Created: 2019-02-05