Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Code Contribution Obfuscation and Misrepresentation
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Message Deletion
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
System Time Modification
Timestomping
Tripwires
Uninstalling Software
Virtualization
- ID: AF032
- Created: 04th May 2026
- Updated: 04th May 2026
- Platforms: WindowsLinuxMacOS
- Contributor: The ITM Team
System Time Modification
A subject modifies the system date, time, time zone, hardware clock, or time synchronization configuration of a device to obscure the chronology of activity relevant to an insider threat investigation. This behavior may affect timestamps associated with file creation, file modification, authentication events, process execution, log generation, scheduled activity, or other forensic artifacts used to reconstruct subject activity.
System time modification may be performed before, during, or after an infringement to create ambiguity in the investigative timeline, frustrate correlation between endpoint, identity, network, and application telemetry, or cause investigators to misinterpret the sequence of events. The behavior should be assessed in context with administrative privilege use, time synchronization changes, endpoint telemetry gaps, and inconsistencies between local artifacts and centralized logging sources.
Subsections (3)
| ID | Name | Description |
|---|---|---|
| AF032.002 | Linux System Time Modification | A subject modifies the Linux system time, time zone, hardware clock, or time synchronization configuration to obscure the chronology of activity relevant to an insider threat investigation. This behavior may affect timestamps associated with file creation, file modification, authentication records, shell history, service execution, package activity, scheduled jobs, and other host-based artifacts used to reconstruct subject activity.
On Linux systems, this behavior may involve commands or utilities such as |
| AF032.003 | macOS System Time Modification | A subject modifies the macOS system date, time, time zone, network time configuration, or time server settings to obscure the chronology of activity relevant to an insider threat investigation. This behavior may affect timestamps associated with file system artifacts, application activity, shell commands, authentication events, endpoint telemetry, browser history, document access, and other evidence used to reconstruct subject activity.
On macOS systems, this behavior may involve manual changes through System Settings or command-line modification using administrative utilities such as |
| AF032.001 | Windows System Time Modification | A subject modifies the Windows system time, time zone, or time synchronization behavior to obscure timestamps associated with local artifacts, event logs, file activity, process execution, or other evidence relevant to an insider threat investigation.
On Windows systems, this behavior may involve manual date and time changes, abuse of the “Change the system time” user right, modification of Windows Time service behavior, or use of administrative tooling to alter clock settings. |