T1564.005

Hidden File System

Adversaries may use a hidden file system to conceal malicious activity from users and security tools. Hidden file systems operate outside normal OS file system abstractions — adversaries write raw data to unused disk space, inside volume slack space, inside NTFS extended attributes, or in specially crafted partitions that aren't mounted by the OS. The Equation Group APT, ComRAT v4, Regin rootkit, and BOOTRASH VBR bootkit all use hidden file systems. This technique makes data invisible to standard forensic tools and EDR sensors that operate at the file system API level.

Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("diskpart.exe", "format.com", "bcdedit.exe")
| extend DiskpartScript = ProcessCommandLine has_any ("select disk", "select volume", "create partition", "delete partition")
| extend BCDEdit = FileName =~ "bcdedit.exe"
| extend FormatDisk = FileName =~ "format.com"
| extend SuspiciousParent = InitiatingProcessFileName has_any ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName,
         DiskpartScript, BCDEdit, FormatDisk, SuspiciousParent
| sort by Timestamp desc
union (
  DeviceProcessEvents
  | where Timestamp > ago(24h)
  | where FileName in~ ("powershell.exe", "cmd.exe")
  | where ProcessCommandLine has_any ("\\Device\\HarddiskVolume", "\\\\.\\PhysicalDrive", "\\\\.\\Harddisk", "CreateFile.*\\\\.\\")
  | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName
  | sort by Timestamp desc
)
high severity low confidence

Data Sources

Process: Process Creation Drive: Drive Access Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • Disk imaging and forensic tools that use raw disk access (dd, FTK Imager, Autopsy) for legitimate forensic analysis
  • System administrators using diskpart for legitimate disk partitioning and management operations
  • Drive encryption software (BitLocker, VeraCrypt) that accesses raw disk sectors during encryption
  • Virtual machine software that uses raw disk access for virtual disk management operations

Unlock Pro Content

Get the full detection package for T1564.005 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections