Time Based Evasion (T1497.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion
  • Discovery

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Joe Security. (2016, April 21). Nymaim - evading Sandboxes with API hammering. Retrieved September 30, 2021. Joe Sec Nymaim
Joe Security. (2020, July 13). TrickBot's new API-Hammering explained. Retrieved September 30, 2021. Joe Sec Trickbot
Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021. ISACA Malware Tricks
Loman, M. et al. (2021, July 4). Independence Day: REvil uses supply chain exploit to attack hundreds of businesses. Retrieved September 30, 2021. Revil Independence Day
Malik, A. (2016, October 14). Nitol Botnet makes a resurgence with evasive sandbox analysis technique. Retrieved September 30, 2021. Netskope Nitol
Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024. Deloitte Environment Awareness