T1564.001: Hidden Files and Directories
Adversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a ‘hidden’ file. These files don’t show up when a user browses the file system with a GUI or when using normal commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interface (GUI) prompts or with command line switches (dir /a
for Windows and ls –a
for Linux and macOS).
On Linux and Mac, users can mark specific files as hidden simply by putting a “.” as the first character in the file or folder name . Files and folders that start with a period, ‘.’, are by default hidden from being viewed in the Finder application and standard command-line utilities like “ls”. Users must specifically change settings to have these files viewable.
Files on macOS can also be marked with the UF_HIDDEN flag which prevents them from being seen in Finder.app, but still allows them to be seen in Terminal.app . On Windows, users can mark specific files as hidden by using the attrib.exe binary. Many applications create these hidden files and folders to store information so that it doesn’t clutter up the user’s workspace. For example, SSH utilities create a .ssh folder that’s hidden and contains the user’s known hosts and keys.
Adversaries can use this to their advantage to hide files and folders anywhere on the system and evading a typical user or system analysis that does not incorporate investigation of hidden files.
Positive Technologies products that cover the technique
MaxPatrol SIEM knowledge base
unix_mitre_attck_defense_evasion: PT-CR-1656: Unix_Suspicious_Hidden_Files: Suspicious activity related to creating or launching hidden files
Detection
ID | DS0022 | Data source and component | File: File Creation | Description | Monitor the file system and shell commands for files being created with a leading ".” |
---|
ID | DS0009 | Data source and component | Process: Process Creation | Description | Monitor newly executed processes that may set files and directories to be hidden to evade detection mechanisms. |
---|
ID | DS0022 | Data source and component | File: File Metadata | Description | Monitor for contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/owner, permissions may set files and directories to be hidden to evade detection mechanisms. |
---|
ID | DS0017 | Data source and component | Command: Command Execution | Description | Monitor the file system and shell commands for files being created with a leading ".” and the Windows command-line use of attrib.exe to add the hidden attribute. |
---|