Detection rules › Sigma

Discovery of a System Time

Severity
low
Author
E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
Source
upstream

Identifies use of various commands to query a systems time. This technique may be used before executing a scheduled task or to discover the time zone of a target system.

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1124 System Time Discovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: 1 of selection_time

or:
Image|endswith: '\net.exe'
Image|endswith: '\net1.exe'
CommandLine|contains: time

Stage 2: 1 of selection_w32tm

CommandLine|contains: tz
Image|endswith: '\w32tm.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • time
  • tz
Imageends_with
  • \net.exe corpus 27 (sigma 27)
  • \net1.exe corpus 25 (sigma 25)
  • \w32tm.exe corpus 2 (sigma 2)