
Summary
The 'File Creation Time Changed' rule is designed to detect potential timestomping activities on Windows systems. Adversaries often modify file timestamps to conceal malicious files by making them appear as legitimate or benign. By monitoring Sysmon event ID 2, which identifies file creation time changes, this rule aims to alert security teams to suspicious modifications that do not match trusted processes, file types, or user accounts. The rule employs a comprehensive query that filters out benign changes, such as those made by common applications or system maintenance tasks, providing a focused detection capability. Investigators are encouraged to analyze the triggering processes and associated user accounts as part of the incident response.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- File
- Process
- User Account
ATT&CK Techniques
- T1070
- T1070.006
Created: 2023-01-17