Detectionmediumtest

Powershell Timestomp

Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François HubautCreated Tue Aug 03Updated Sun Dec 25c6438007-e081-42ce-9483-b067fbef33c3windows
Log Source
WindowsPowerShell Script
ProductWindows← raw: windows
CategoryPowerShell Script← raw: ps_script

Definition

Requirements: Script Block Logging must be enabled

Detection Logic
Detection Logic1 selector
detection:
    selection_ioc:
        ScriptBlockText|contains:
            - '.CreationTime ='
            - '.LastWriteTime ='
            - '.LastAccessTime ='
            - '[IO.File]::SetCreationTime'
            - '[IO.File]::SetLastAccessTime'
            - '[IO.File]::SetLastWriteTime'
    condition: selection_ioc
False Positives

Legitimate admin script

MITRE ATT&CK
Rule Metadata
Rule ID
c6438007-e081-42ce-9483-b067fbef33c3
Status
test
Level
medium
Type
Detection
Created
Tue Aug 03
Modified
Sun Dec 25
Path
rules/windows/powershell/powershell_script/posh_ps_timestomp.yml
Raw Tags
attack.defense-evasionattack.t1070.006
View on GitHub