In this module
Anti-Forensics Overview
Figure WF0.9 — Four categories of anti-forensic techniques. Destruction is the most common and leaves the most traces. Avoidance is the most sophisticated and leaves the fewest traces. Every technique leaves some residual indicator — the examiner's job is to know where to look.
Destruction: the most common, the most detectable
The overwhelming majority of anti-forensic activity in real-world incidents is artifact destruction — deleting the evidence. Attackers clear Event Logs, delete Prefetch files, empty the Recycle Bin, clear browser history, and delete their tools after use. These actions are effective against examiners who only analyze what is present. They are largely ineffective against examiners who analyze what is missing and what the destruction itself reveals.
Event Log clearing is the single most common anti-forensic action in enterprise compromises. The command wevtutil cl Security clears the Security Event Log. The irony: clearing the Security log generates Event ID 1102 in the Security log — a record that the log was cleared, including the account that cleared it and the timestamp. If the attacker clears all Event Logs (Security, System, Application, PowerShell), Event ID 104 in the System log records each clearing. Even if all logs are cleared simultaneously, the clearing events for the System log are written before the System log itself is cleared — creating a narrow window where the clearing evidence exists. Additionally, Event Log files that were cleared can sometimes be recovered from Volume Shadow Copies (taken before the clearing), from $LogFile entries (if the clearing is recent enough), and from centralized log collection (SIEM, WEF).
Prefetch deletion removes execution evidence. An attacker who deletes their tools and then deletes the corresponding Prefetch files eliminates both the executable and the execution evidence. The residual traces: the USN Journal records the deletion of the Prefetch file itself (FILE_DELETE reason code for a .pf file in C:\Windows\Prefetch). The MFT may retain the deleted Prefetch file's MFT record (marked as free but containing the filename and timestamps). If the attacker deletes the entire Prefetch folder content, the mass deletion generates a burst of USN Journal entries that is itself a detectable anomaly — hundreds of FILE_DELETE entries for .pf files within seconds.
USN Journal deletion (fsutil usn deletejournal /d C:) destroys the filesystem change log. This eliminates the examiner's ability to reconstruct file operations through the journal. The residual traces: the $UsnJrnl:$J stream's MFT attributes show the journal was deleted and recreated (the journal file's MFT timestamps reflect the recreation time, not the original creation time). The $LogFile may contain NTFS transactions from the journal deletion. And the act of running fsutil generates its own Prefetch file, Event Log entries (process creation if auditing is enabled), and Amcache/Shimcache records.
Manipulation: harder to detect, harder to execute
Artifact manipulation — changing the evidence rather than deleting it — is more sophisticated than destruction and more difficult to detect because the artifact still exists. The examiner finds evidence that looks normal but contains altered values.
Timestomping is the most common manipulation technique. The attacker modifies $STANDARD_INFORMATION timestamps to make a malicious file appear to have been created months ago, blending it with legitimate system files. The detection is the $SI/$FN timestamp discrepancy described in WF0.4 — $SI timestamps are modifiable via SetFileTime(), $FN timestamps are not. Additional indicators: zero nanoseconds in $SI timestamps (programmatic setting), $SI Created earlier than $FN Created (backdating), and USN Journal entries showing the file was actually created at a different time than $SI claims.
Log injection — inserting fabricated entries into Event Logs — is theoretically possible but rarely seen in practice. The EVTX format includes checksums per chunk that make seamless injection difficult without corrupting the log file. Injecting entries requires either writing to the Event Log via the Windows API (which records the source process) or directly manipulating the binary EVTX file (which risks checksum validation failures). The difficulty of seamless log injection is why most attackers opt for log clearing rather than log manipulation.
Registry manipulation — modifying registry values to hide persistence or alter execution evidence — is straightforward for individual values but difficult to do comprehensively. An attacker who modifies a service's ImagePath to point to a legitimate executable hides the malicious path, but the modification updates the key's last write timestamp and may be recorded in the registry transaction log. Restoring the original ImagePath after execution creates a second timestamp update. The examiner who checks the registry transaction logs can see the modification history.
Concealment: hiding in plain sight
Concealment techniques hide data rather than destroying or modifying it. The data exists on the system but is not visible through standard examination methods.
Alternate Data Streams store data in named streams attached to files or directories. A file report.docx:payload.exe contains a hidden executable in a named stream that is invisible to standard directory listings. The MFT records ADS as additional $DATA attributes — MFTECmd reports them, and any MFT analysis that checks for multiple $DATA attributes will detect them. Concealment via ADS is easily detected by artifact-aware examiners but can evade examiners who only look at file listings.
Encrypted containers (VeraCrypt, BitLocker non-system volumes) prevent access to content without the decryption key. The container file itself is visible in the MFT and generates USN Journal entries, Prefetch files (for the encryption tool), and ShellBag entries (if the mounted volume was browsed). The examiner can prove the container exists, when it was created and accessed, and what tool was used to mount it — but cannot access the contents without the key. In some jurisdictions, the court can compel the key; in others, the container contents remain inaccessible.
Avoidance: the hardest to detect
Avoidance techniques prevent artifact creation in the first place. Memory-only tools that never write to disk, reflective DLL injection that loads code without creating a file, .NET assemblies loaded directly from network streams into memory, and PowerShell payloads that execute entirely in the PowerShell process without touching the filesystem — all of these avoid creating the disk artifacts that this course teaches you to analyze.
The limitation of avoidance is that it only avoids disk artifacts. It does not avoid memory artifacts (detectable through memory forensics — covered in the planned Memory Forensics Specialist course), process creation events (detectable through Sysmon and EDR), network communication artifacts (detectable through SRUM, DNS cache, and network logs), and the artifacts created by the proxy executables themselves. A PowerShell fileless payload avoids creating an executable file, but powershell.exe generates a Prefetch file, an Event Log entry (if ScriptBlock logging is enabled the full script content is recorded), and EDR telemetry for the process creation with command-line arguments.
Your analysis reveals the attacker cleared the Prefetch directory, deleted the USN Journal, and timestomped the $SI timestamps on their tools. Event Logs were NOT cleared. The incident commander asks: "How sophisticated is this attacker?"
Your options: (A) Highly sophisticated — they performed three distinct anti-forensic operations targeting different artifact types. (B) Moderately sophisticated with gaps. The attacker understood Prefetch, USN Journal, and $SI timestamps — three common forensic targets documented in DFIR training. But they missed: Amcache (SHA1 hashes preserved), Shimcache (execution evidence preserved), BAM/DAM (user attribution preserved), Event Logs (process creation preserved), and $FN timestamps (real creation times preserved). The selective cleanup pattern — targeting popular forensic artifacts while missing less-publicized ones — is consistent with an attacker who has read DFIR blog posts but lacks deep forensic training. A truly sophisticated attacker would also clear Amcache, manipulate Event Logs, and understand $FN timestamp persistence.
The correct approach is B. The anti-forensic profile reveals the attacker's knowledge level — useful for threat assessment and for knowing which compensating evidence sources to check.
Try It — Identify Anti-Forensic Indicators in KAPE Output
If you have a KAPE collection from a system (your lab VM or a practice image), look for these anti-forensic indicators:
1. Event Log clearing: Open the Security Event Log in Event Log Explorer or EvtxECmd. Search for Event ID 1102. If present, the log was cleared — note the timestamp and the account name. Check the System Event Log for Event ID 104. If both Security and System were cleared, check if any events predate the clearing timestamp — these were generated after the clear and represent the clearing event itself plus any subsequent activity.
2. Prefetch anomalies: List all Prefetch files sorted by creation timestamp. A gap in the timestamp sequence (e.g., no Prefetch files created between March 15 and March 28, then a burst of new files) suggests the Prefetch directory was cleared on approximately March 15. Check for Prefetch files for known cleanup tools: SDELETE.EXE, CCLEANER.EXE, ERASER.EXE, BLEACHBIT.EXE.
3. USN Journal freshness: Check the oldest entry in the USN Journal. If the oldest entry is very recent (within hours or days) on a system that has been running for months, the journal was likely deleted and recreated. Compare the journal's MFT record creation timestamp against the system installation date.
4. Timestomping indicators: Parse the MFT with MFTECmd. Add a calculated column in Timeline Explorer: Created0x10 minus Created0x30. Sort by this column descending. Files where $SI Created is significantly earlier than $FN Created are timestomping candidates. Files where $SI Created has .0000000 nanoseconds surrounded by files with normal sub-second values are programmatic setting candidates.
Document what you find. Even on a clean lab VM, you may discover interesting patterns — Windows itself generates some timestamp behaviors that look suspicious but are legitimate (file tunneling, copy operations, Windows Update timestamps).
The myth: If the attacker cleared the logs, deleted their tools, and timestomped the remaining artifacts, the forensic examination cannot produce useful findings. Anti-forensics defeats forensic analysis.
The reality: Anti-forensics defeats lazy forensic analysis. Comprehensive artifact analysis across multiple independent sources defeats most anti-forensic techniques because the attacker cannot simultaneously destroy all artifact categories without generating new artifacts in the process. Cleared Event Logs leave Event ID 1102/104 records, USN Journal entries for the EVTX file modifications, and Prefetch evidence for wevtutil.exe. Deleted Prefetch files leave USN Journal entries and MFT orphan records. Timestomped files are detected through $SI/$FN comparison and USN Journal correlation. The examiner who analyzes all artifact categories — not just the obvious ones — finds the evidence the attacker missed. Furthermore, the anti-forensic activity itself is evidence: it demonstrates that the subject had the knowledge, access, and motivation to destroy evidence, which is typically more incriminating than the underlying activity would have been.
Troubleshooting
"How do I distinguish anti-forensic cleanup from normal system maintenance?" Context and pattern. A user running CCleaner on their personal workstation on a monthly schedule is maintenance. A user running CCleaner for the first time (per Prefetch) on the day after a data loss prevention alert is suspicious. Event Logs clearing on a workstation is almost never legitimate — there is no normal operational reason for a user to clear the Security log. USN Journal deletion is never part of normal system operation. The investigative context — timing relative to the incident, the account that performed the action, the scope of the cleanup — distinguishes maintenance from anti-forensics.
"What about disk encryption — if the whole disk is BitLocker-encrypted, can we still analyze artifacts?" If the system is powered on and the volume is unlocked, yes — KAPE collects from the decrypted logical volume. If the system is powered off, you need the BitLocker recovery key to unlock the volume before analysis. In enterprise environments, BitLocker recovery keys are typically stored in Active Directory or Intune. If the recovery key is available, encryption does not impede forensic analysis. If the recovery key is unavailable and the system is powered off, the disk contents are inaccessible. This is one reason to prioritize live collection from running, unlocked systems before powering them off.
"Sophisticated attackers use memory-only tools — how do we detect those from disk artifacts alone?" You can't always detect memory-only activity from disk artifacts — that's why memory forensics exists as a separate discipline. What you can detect from disk artifacts: the proxy executables used to launch memory-only payloads (Prefetch for powershell.exe, rundll32.exe, mshta.exe), the network communication generated by the in-memory tool (SRUM bytes sent/received, DNS cache entries, browser artifacts if web-based C2), and the aftermath of the in-memory activity (files created, registry keys modified, credentials dumped to disk). The disk artifacts provide the envelope of activity around the memory-only execution, even if they don't capture the execution itself.
You've built the foundations of artifact-level forensic analysis.
WF0 gave you the taxonomy, NTFS architecture, and the five-step methodology. WF1 took you inside the MFT at the binary level — every attribute, every timestamp, every edge case. From here, every artifact category gets the same raw-first treatment.
- WF2–WF10: every major Windows artifact decoded at binary level — USN Journal, Prefetch, Amcache, Shimcache, ShellBags, LNK, Jump Lists, SRUM, Event Logs, and the Registry hives
- INC-NE-2026-0915 (WF13) — Insider data exfiltration capstone. Work the complete investigation from USB history to OneDrive exfiltration evidence
- INC-NE-2026-1022 (WF14) — Ransomware capstone. Three-host triage (FIN01 → IT03 → FS01) across the 72-hour attack chain
- The lab pack — 25+ realistic evidence files in 10 formats, simulated KAPE triage pre-populated, both capstones deployable to your own VM
- Anti-forensic detection methodology — defeat timestomping, log clearing, and Prefetch deletion with cross-artifact correlation
Cancel anytime