<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Timestomp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/timestomp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/timestomp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Timestomping of Executable Files on Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</guid><description>This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.</description><content:encoded><![CDATA[<p>This detection identifies attempts to modify the timestamps of executable files within sensitive directories on Windows systems, a technique known as timestomping. Timestomping is employed by adversaries to disguise malicious files as legitimate system components, making them harder to detect. The rule focuses on changes to file creation timestamps in directories like <code>System32</code>, <code>SysWOW64</code>, <code>ProgramData</code>, and common startup locations. It excludes known legitimate processes to reduce false positives. The goal of this technique is to evade detection and maintain persistence within the compromised system. This behavior is typically associated with post-exploitation activity after initial access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., exploiting a vulnerability).</li>
<li>The attacker uploads a malicious executable (e.g., a backdoor or malware dropper) to a location on the filesystem.</li>
<li>The attacker uses a tool or script (e.g., PowerShell, built-in Windows utilities) to modify the creation timestamp of the malicious executable.</li>
<li>The timestamp is set to match that of a legitimate system file in the same directory, such as a DLL in <code>C:\Windows\System32</code>.</li>
<li>The attacker may then configure persistence for the timestomped executable, such as creating a registry entry in <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code>.</li>
<li>The malicious executable remains dormant, blending in with other legitimate files and evading initial detection.</li>
<li>The attacker triggers the execution of the timestomped executable, either manually or through scheduled tasks, registry entries or other persistence mechanisms.</li>
<li>The malicious executable performs its intended function, such as establishing a reverse shell or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful timestomping can allow attackers to maintain a persistent presence on a compromised system while evading detection by security tools and administrators. This can lead to prolonged data theft, system compromise, and other malicious activities. The technique is often used in conjunction with other evasion methods to further obscure malicious activity. A successful attack could lead to data exfiltration, ransomware deployment, or long-term espionage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 2 (File creation time changed) logging to capture timestomping activity as described in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Potential Timestomp in Executable Files&rdquo; to your SIEM to detect suspicious file timestamp modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying file creation times in sensitive system directories.</li>
<li>Review the process ancestry of processes modifying file timestamps to identify potentially malicious parent processes.</li>
<li>Monitor for execution of files with recently modified timestamps using process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>timestomp</category><category>windows</category></item></channel></rss>