|T1070.001||Clear Windows Event Logs|
|T1070.002||Clear Linux or Mac System Logs|
|T1070.003||Clear Command History|
|T1070.005||Network Share Connection Removal|
|T1070.007||Clear Network Connection History and Configurations|
|T1070.008||Clear Mailbox Data|
Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder. This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools.
APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, APT32 has used a random value to modify the timestamp of the file storing the clientID.
Several Lazarus Group malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.
|S0141||Winnti for Windows|
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
|ID||Data Source||Data Component||Detects|
Monitor for file modifications that collects information on file handle opens and can compare timestamp values
Monitor for unexpected modifications to file timestamps