Microsoft-Windows-Security-Auditing › Event 4616

Event ID 4616 — The system time was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security State Change
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

The system time was changed.

Message #

The system time was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	Process ID: %9
	Name: %10

Previous Time: %6 %5
New Time: %8 %7

This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PreviousTime FILETIMEPrevious Time
NewTime FILETIMENew Time
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4616,
    "version": 1,
    "level": 0,
    "task": 12288,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:32:22.236565+00:00",
    "event_record_id": 3458,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 52
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PreviousTime": "2023-11-05T22:32:20.942615Z",
    "NewTime": "2023-11-05T22:32:22.232000Z",
    "ProcessId": "0xcec",
    "ProcessName": "C:\\Program Files\\VMware\\VMware Tools\\vmtoolsd.exe"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #