Detecting CMOS Clock Changes
Detecting CMOS Clock Changes
Search
Detecting CMOS Clock Changes
Posted on January 15, 2011 by Lee Whitfield in Technical Articles.
Search
During my short career in digital forensics I have seen and heard a number of defences. One that I
have seen emerge a number of times is the claim that one of the parties has been ‘framed’ or ‘set-
up’ by someone by changing the system clock and doing some nefarious deed before setting the clock
back to the correct time.
Items by Category
If, for example, someone did this on my computer and browsed to some inappropriate website, all 4:mag
the internet history records and cached files would reflect the changed time. To the casual observer, Experiences
a judge, or a jury it may look like I was responsible. Even a seasoned forensic investigator may be
fooled into believing that it was I that did the deed. Without digging deeper each of us could be Methodologies & Best Practices
Dependent on your position how would you support/dismiss such a claim? I’ve given this a bit of Podcast Episodes
Uncategorized
These are the superb resources for many reasons but we’re going to focus specifically on the time
stamps for the entries.
Items by Month
Event logs in Windows XP has a default size of 512KB. In both Vista and Windows 7 the default size on
event logs is 20MB. In either circumstance the logs act the same way – they fill up in order of events. May 2017
Once the log is full it goes back to the beginning implementing a first-in-first-out overwriting process
March 2017
of old records.
October 2016
So, what would you expect to see if the system clock had been changed?
June 2016
Depending on the software and services running on the computer the event logs could generate May 2016
hundreds of entries every day. This means that we should be able to easily identify any discrepancies
April 2016
in the logs. As the logs are written in order of occurrence we should be able to tell if the system
clock has been changed by parsing the event logs themselves and ordering them by file offset. If the March 2016
dates suddenly jump backwards and then forwards again it is a good indication that the system clock January 2016
has been changed. Conversely if you see no such activity it is a good indication that the system clock
has not been changed. November 2015
July 2015
If someone changed the system clock from inside Windows (in Vista and Windows 7) then the clock
change is also recorded in the event log as event ID 1. Such entries will appear as follows: May 2015
April 2015
The system time has changed to 01/01/2011 08:51:43 from 15/01/2011 08:51:43.
January 2015
June 2014
If files were accessed or created during a suspected changing of the system clock then evidence may
also be found in the link files on the computer. May 2014
April 2014
Harry Parsonage has done a lot of work on link files. As part of his research he has found that link
files contain a sequence value. This value is incremented when the operating system is January 2014
started/restarted. This means that all link files from a single session will retain the same sequence
December 2013
value, when the computer is rebooted the sequence value increases.
November 2013
If the computer clock has not been changed then parsing the link files and ordering them by their
September 2013
sequence value should also mean that the links are in date order. If, in ordering the link files by
sequence value, we see that the dates do not align it is fair to say that the system clock has been June 2013
changed.
May 2013
May 2012
Since Windows XP restore points have been used by Microsoft. They have changed somewhat since
being introduced but they essentially serve the same purpose. In each version of Windows the restore April 2012
points are stored in the folder “System Volume Information”.
March 2012
In XP the restore points are named incrementally. Each restore point will be contained in a folder January 2012
with a naming convention of “RP##” where “##” is the incremental restore point number. If a restore
December 2011
point was created during a clock change there will be anomalies. What an analyst would see is
ordered restore points but, when looking at the “RP” folders in order of creation datesthe November 2011
incremental numbers would not match up. If this is the case then it is likely that the system clock
October 2011
has been changed.
September 2011
The same thing goes for Vista and Windows 7. Although the restore points (shadow volumes or
July 2011
difference files) are different the same principles would apply. If a restore point was created during
a clock change the order of the shadow volumes would be changed. The file named {3808876b-c176- June 2011
4e48-b7ae-04046e6cc752} is an index of shadow volumes and is kept in order of creation, meaning
May 2011
that the most recent shadow volume will be last in the file. Each of these is recorded with the
creation time of the difference file so an analyst could simply look at the creation times of the April 2011
difference files and, if any are out of order it is evidence that the system clock has been changed.
March 2011
January 2011
A number of web pages include date and time stamps. The most obvious of these are forums, but
time stamps are also found in web-based email, blog entries, Facebook, Twitter, and so on. Each of December 2010
these would provide a clear indication of clock adjustment when looking at the creation and November 2010
download dates of the data.
October 2010
Others September 2010
Each of these provide a very systematic method for detecting clock manipulation but there are other August 2010
ways for detecting such things. For example, a prefetch file may contain information about accessing July 2010
specific files that may not have existed on the computer at the changed time, or an email message
header will contain information about the date and time sent, HTTP response headers also have time June 2010
April 2010
Summing Up
March 2010
If someone claims that the system clock has been changed we can provide substantial evidence
February 2010
supporting or refuting such claims. It may well be the case that a computer clock has been changed
but it is then up to us to provide evidence to support our claims and not just suggest that it may January 2010
have happened.
December 2009
Do you have any other methods for detecting clock changes? Please feel free to add them in the November 2009
comments.
October 2009
September 2009
← Previous Post Next Post →
August 2009
July 2009
If you enjoyed this article please consider sharing it!
June 2009
March 2009
February 2009
November 2008
January 15, 2011 at 4:18 pm
September 2008
Reply
August 2008
July 2008
Rob Lee says:
June 2008
Reply
Thanks Rob.
Reply
Reply
Nicely done! Love your podcast, and I share with students and staff here at Vanderbilt.
Great work!
Reply
So, your trusting computer logs (say a web browser history) to blame someone for some
action but then are willing to trust alternate evidence on the same computer that the
clock was tampered with? Well, I would just tampler with the browser logs first if I was
going to frame you and then never need to mess with the clock.
Reply
I can understand your point but think you’ve got the wrong end of the
stick. I looked at all of these items (and more) in order to show that the
clock had NOT been tampered with. It would be foolish to look at only
one piece of evidence to draw conclusions. You would have to look at
several items for corroboration or disproving of your hypotheses.
Editing the internet history and browser logs would be a clever way of
manipulating evidence but that would also leave evidence that would
need to be cleaned up. Think of the time stamps inside the actual pages,
the time stamps of the cache files created, if you opened the file/folder
in Windows you have registry entries showing the date and time you
access those files for manipulation, you have the last-write times of the
history logs… as you can see the list goes on.
I’m not sure if it is possible to completely hide the evidence of
manipulation. Windows records so much for every single action that you’d
need expert knowledge of the system, and a lot of time, to clean up your
access afterwards.
Reply
Leave a Reply
Comment
Name
Website