

The system time is set and stored by the Windows Time Service within a domain to maintain time synchronization between systems and services in an enterprise network.Īdversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on the system.


The input sample is signed with a certificate Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager.Ĭontains ability to open/control a serviceĬode signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with.
