Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF022
- Created: 20th May 2025
- Updated: 01st November 2025
- Platforms: WindowsLinuxMacOSAmazon Web Services (AWS)Microsoft AzureGoogle Cloud Platform (GCP)Oracle Cloud Infrastructure (OCI)
- MITRE ATT&CK®: T1564.006T1564
- Contributor: The ITM Team
Virtualization
The subject leverages virtualization technologies—including hypervisors and virtual machines—to obscure forensic artifacts, isolate malicious activity, or evade host-based monitoring. By conducting operations within a guest operating system, the subject reduces visibility to host-level security tools and complicates the forensic process by separating volatile and persistent data across system boundaries.
This strategy allows the subject to:
- Contain incriminating tools, logs, or staged data entirely within a VM.
- Avoid leaving artifacts on the host system's registry, file system, or memory.
- Leverage disposable VMs to execute high-risk actions and erase evidence through snapshot rollback or VM deletion.
- Evade host-based endpoint detection and response (EDR) tools that lack introspection into virtualized environments.
- Run guest OSes in stealth configurations (e.g., nested VMs, portable hypervisors) to further frustrate attribution and recovery efforts.
Subsections (4)
| ID | Name | Description |
|---|---|---|
| AF022.003 | Portable Hypervisors | The subject uses a portable hypervisor to launch a virtual machine from removable media or user-space directories, enabling covert execution of tools, data staging, or operational activities. These hypervisors can run without installation, system-wide configuration changes, or elevated privileges, bypassing standard application control, endpoint detection, and logging.
Portable hypervisors are often used to:
Example Scenarios:
|
| AF022.004 | Snapshots and Rollbacks to Remove Evidence | The subject uses virtual machine snapshots, checkpoints, or revert-to-save-state features to erase forensic evidence of activity within a virtualized environment. By taking a snapshot before conducting malicious or high-risk operations, the subject ensures they can later roll the system back—removing all traces of files, commands, logs, and process history created during the session.
This technique allows the subject to:
Example Scenarios:
|
| AF022.001 | Use of a Virtual Machine | The subject uses a virtual machine (VM) on an organization device to contain artifacts of forensic value within the virtualized environment, preventing them from being written to the host file system. This strategy helps to obscure evidence and complicate forensic investigations. By running a guest operating system within a VM, the subject can potentially evade detection by security agents installed on the host operating system, as these agents may not have visibility into activities occurring within the VM. This adds an additional layer of complexity to forensic analysis, making it more challenging to detect and attribute malicious activities. |
| AF022.002 | Use of Windows Subsystem for Linux (WSL) | The subject leverages Windows Subsystem for Linux (WSL) to contain forensic artifacts within a Linux-like runtime environment embedded in Windows. By operating inside WSL, the subject avoids writing sensitive data, tool activity, or command history to traditional Windows locations, significantly reducing visibility to host-based forensic and security tools.
WSL creates a logical Linux environment that appears separate from the Windows file system. Although some host-guest integration exists, activity within WSL often bypasses standard Windows event logging, registry updates, and process tracking. This allows the subject to execute scripts, use Unix-native tools, stage exfiltration, or decrypt payloads with minimal footprint on the host.
Example Scenarios:
|
Preventions (3)
Detections (9)
MITRE ATT&CK® Mapping (2)
ATT&CK Enterprise Matrix Version 17.1