2020-02-20 22:00:16 +00:00
title : Discovery of a System Time
2019-12-19 22:56:36 +00:00
id : b243b280-65fe-48df-ba07-6ddea7646427
2020-01-19 21:34:16 +00:00
description : "Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system."
2019-10-28 10:59:49 +00:00
status : experimental
2019-11-11 19:51:35 +00:00
author : E.M. Anhaus (orignally from Atomic Blue Detections, Endgame), oscd.community
2019-10-28 10:59:49 +00:00
date : 2019 /10/24
2019-11-11 19:51:35 +00:00
modified : 2019 /11/11
references :
- https://eqllib.readthedocs.io/en/latest/analytics/fcdb99c2-ac3c-4bde-b664-4b336329bed2.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1124/T1124.md
2019-10-28 10:59:49 +00:00
tags :
- attack.discovery
- attack.t1124
2020-01-19 21:34:16 +00:00
logsource :
category : process_creation
product : windows
2019-10-28 10:59:49 +00:00
detection :
2019-11-11 19:51:35 +00:00
selection :
- Image|endswith :
- '\net.exe'
- '\net1.exe'
CommandLine|contains : 'time'
- Image|endswith : '\w32tm.exe'
CommandLine|contains : 'tz'
- Image|endswith : '\powershell.exe'
CommandLine|contains : 'Get-Date'
condition : selection
2019-10-28 10:59:49 +00:00
falsepositives :
2019-11-11 19:51:35 +00:00
- Legitimate use of the system utilities to discover system time for legitimate reason
2020-01-19 21:34:16 +00:00
level : low