Threat Huntlowtest

File Creation Date Changed to Another Year

Detects when the file creation time is changed to a year before 2020. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity. In order to use this rule in production, it is recommended first baseline normal behavior in your environment and then tune the rule accordingly. Hunting Recommendation: Focus on files with creation times set to years significantly before the current date, especially those in user-writable directories. Correlate with process execution logs to identify the source of the modification and investigate any unsigned or suspicious binaries involved.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François Hubaut, Florian Roth (Nextron Systems)Created Fri Aug 12Updated Tue Jan 20558eebe5-f2ba-4104-b339-36f7902bcc1awindows
Hunting Hypothesis
Log Source
WindowsFile Change
ProductWindows← raw: windows
CategoryFile Change← raw: file_change
Detection Logic
Detection Logic7 selectors
detection:
    selection:
        PreviousCreationUtcTime|startswith: '202'
    filter_main_creation_time:
        CreationUtcTime|startswith: '202'
    filter_main_program_files:
        - TargetFilename|startswith:
              - 'C:\Program Files\'
              - 'C:\Program Files (x86)\'
        - Image|startswith:
              - 'C:\Program Files\'
              - 'C:\Program Files (x86)\'
    filter_optional_updates:
        - Image:
              - 'C:\Windows\system32\ProvTool.exe'
              - 'C:\Windows\System32\usocoreworker.exe'
              - 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe'
        - TargetFilename|startswith: 'C:\ProgramData\USOPrivate\UpdateStore\'
        - TargetFilename|endswith:
              - '.tmp'
              - '.temp'
    filter_optional_cab:
        Image|startswith: 'C:\WINDOWS\System32\'
        Image|endswith:
            - '\TiWorker.exe'
            - '\svchost.exe'
            - '\sihclient.exe'
        TargetFilename|endswith: '.cab'
    filter_optional_msiexec:
        Image: 'C:\Windows\system32\msiexec.exe'
    filter_optional_vcredist:
        Image|startswith: 'C:\Windows\Temp\'
        Image|endswith: '\VCREDI~1.EXE'
    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
False Positives

Changes made to or by the local NTP service

Software installations and updates

MITRE ATT&CK

Other

detection.threat-hunting
Rule Metadata
Rule ID
558eebe5-f2ba-4104-b339-36f7902bcc1a
Status
test
Level
low
Type
Threat Hunt
Created
Fri Aug 12
Modified
Tue Jan 20
Path
rules-threat-hunting/windows/file/file_change/file_change_win_date_changed_to_another_year.yml
Raw Tags
attack.t1070.006attack.defense-evasiondetection.threat-hunting
View on GitHub