EXPLORE
← Back to Explore
T1497.003

Time Based Checks

Adversaries may employ various time-based methods to detect virtualization and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of time. This may include enumerating time-based properties, such as uptime or the system clock. Adversaries may use calls like `GetTickCount` and `GetSystemTimeAsFileTime` to discover if they are operating within a virtual machine or sandbox, or may be able to identify a sandbox accelerating time by sampl...

LinuxmacOSWindows
4
Detections
2
Sources
0
Threat Actors

BY SOURCE

3splunk_escu1elastic

PROCEDURES (3)

Evasion2 detections

Auto-extracted: 2 detections for evasion

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

DETECTIONS (4)