
Summary
The Time Provider Persistence Registry detection rule identifies suspicious modifications to the Windows registry path associated with time provider settings. This registry path is found at 'CurrentControlSet\Services\W32Time\TimeProviders', and changes to this area can indicate an effort by an attacker to establish persistence on a compromised system. The analytic utilizes Sysmon EventID 12 and 13 for detecting registry changes. Unusual activity in this registry location is a red flag, as it could allow an attacker to execute malicious code on system boot, thereby continuing their intrusion. The detection relies on the Endpoint.Registry data model to monitor registry events, providing visibility into potential persistence mechanisms being employed by adversaries. Given the nature of the registry keys involved, any modification should be scrutinized for potential malicious intent, especially in the context of privilege escalation and system integrity threats.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- User Account
ATT&CK Techniques
- T1547
- T1547.003
Created: 2024-12-08