Attacker Used Timestomping, Log Clearing, or Other Anti-Forensics

Evidence of deliberate anti-forensic activity has been found: timestamps modified, event logs cleared, prefetch/shimcache wiped, or tools designed to defeat forensic analysis were executed. Standard timeline analysis may be unreliable.

Signals

  • Event ID 1102 (Security log cleared) or Event ID 104 (System log cleared) detected
  • $STANDARD_INFORMATION timestamps do not match $FILE_NAME timestamps in the MFT (timestomping indicator)
  • Prefetch files or AmCache entries have been selectively deleted
  • Known anti-forensic tools (Timestomp, CCleaner, SDelete) identified in process telemetry or on disk

Pivot Actions

  1. 1.Use $MFT $FILE_NAME timestamps (harder to modify) and USN Journal entries as a more reliable timeline source
  2. 2.Cross-reference endpoint timestamps with external sources (DC logs, SIEM, proxy) that the attacker could not reach
  3. 3.Analyze NTFS artifacts ($LogFile, $UsnJrnl) which often retain evidence of the original file operations even after timestomping
  4. 4.Look for evidence of the anti-forensic tool execution itself -- the act of clearing logs leaves its own forensic trail

Alternate Evidence Sources

  • NTFS $MFT $FILE_NAME timestamps and $UsnJrnl:$J change records
  • Domain controller and SIEM logs that exist outside attacker control
  • Cloud audit logs (M365 UAL, Azure AD) independent of on-prem manipulation
  • EDR telemetry recorded in a cloud-hosted backend beyond attacker reach