NTFS File Attributes (T1564.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018. MalwareBytes ADS July 2015
Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018. SpectorOps Host-Based Jul 2017
Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016. Journey into IR ZeroAccess NTFS EA
Hughes, J. (2010, August 25). NTFS File Attributes. Retrieved March 21, 2018. Microsoft NTFS File Attributes Aug 2010
Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018. Microsoft ADS Mar 2014
Microsoft. (n.d.). File Streams. Retrieved September 12, 2024. Microsoft File Streams
Moe, O. (2018, April 11). Putting Data in Alternate Data Streams and How to Execute It - Part 2. Retrieved June 30, 2018. Oddvar Moe ADS2 Apr 2018
Moe, O. (2018, January 14). Putting Data in Alternate Data Streams and How to Execute It. Retrieved June 30, 2018. Oddvar Moe ADS1 Jan 2018
Pravs. (2009, May 25). What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?. Retrieved March 21, 2018. Symantec ADS May 2009