Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder. This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools. Timestomping may be used along with file name Masquerading to hide malware and tools. (Citation: WindowsIR Anti-Forensic Techniques)Detection: Forensic techniques exist to detect aspects of files that have had their timestamps modified. (Citation: WindowsIR Anti-Forensic Techniques) It may be possible to detect timestomping using file modification monitoring that collects information on file handle opens and can compare timestamp values.
Platforms: Linux, Windows
Data Sources: File monitoring, Process monitoring, Process command-line parameters
Defense Bypassed: Host forensic analysis
Permissions Required: User, Administrator, SYSTEM
Stomps on the access timestamp of a file
Supported Platforms: Linux, macOS
Name | Description | Type | Default Value |
---|---|---|---|
target_filename | Path of file that we are going to stomp on last access time | Path |
touch -a -t 197001010000.00 #{target_filename}
Stomps on the modification timestamp of a file
Supported Platforms: Linux, macOS
Name | Description | Type | Default Value |
---|---|---|---|
target_filename | Path of file that we are going to stomp on last access time | Path |
touch -m -t 197001010000.00 #{target_filename}
Stomps on the create timestamp of a file
Setting the creation timestamp requires changing the system clock and reverting. Sudo or root privileges are required to change date. Use with caution.
Supported Platforms: Linux, macOS
Name | Description | Type | Default Value |
---|---|---|---|
target_filename | Path of file that we are going to stomp on last access time | Path |
NOW=$(date)
date -s "1970-01-01 00:00:00"
touch #{target_filename}
date -s "$NOW"
stat #{target_filename}