|T1547.001||Registry Run Keys / Startup Folder|
|T1547.004||Winlogon Helper DLL|
|T1547.005||Security Support Provider|
|T1547.006||Kernel Modules and Extensions|
|T1547.013||XDG Autostart Entries|
Adversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables time synchronization across and within domains. W32Time time providers are responsible for retrieving time stamps from hardware/network resources and outputting these values to other network clients.
Time providers are implemented as dynamic-link libraries (DLLs) that are registered in the subkeys of
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W32Time\TimeProviders\. The time provider manager, directed by the service control manager, loads and starts time providers listed and enabled under this key at system
startup and/or whenever parameters are changed.
Adversaries may abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time provider. Administrator privileges are required for time provider registration, though execution will run in context of the Local Service account.
|M1022||Restrict File and Directory Permissions||
Consider using Group Policy to configure and block additions/modifications to W32Time DLLs. 
|M1024||Restrict Registry Permissions||
Consider using Group Policy to configure and block modifications to W32Time parameters in the Registry. 
|ID||Data Source||Data Component||Detects|
Monitor executed commands and arguments that may abuse time providers to execute DLLs when the system boots.
There is no restriction on the number of custom time providers registrations, though each may require a DLL payload written to disk. 
|DS0024||Windows Registry||Windows Registry Key Modification||
Monitor for changes made to windows registry keys and/or values modifying W32Time information in the Registry.