T1564.005
Hidden File System
Adversaries may use a hidden file system to conceal malicious activity from users and security tools. Hidden file systems operate outside normal OS file system abstractions — adversaries write raw data to unused disk space, inside volume slack space, inside NTFS extended attributes, or in specially crafted partitions that aren't mounted by the OS. The Equation Group APT, ComRAT v4, Regin rootkit, and BOOTRASH VBR bootkit all use hidden file systems. This technique makes data invisible to standard forensic tools and EDR sensors that operate at the file system API level.
Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("diskpart.exe", "format.com", "bcdedit.exe")
| extend DiskpartScript = ProcessCommandLine has_any ("select disk", "select volume", "create partition", "delete partition")
| extend BCDEdit = FileName =~ "bcdedit.exe"
| extend FormatDisk = FileName =~ "format.com"
| extend SuspiciousParent = InitiatingProcessFileName has_any ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName,
DiskpartScript, BCDEdit, FormatDisk, SuspiciousParent
| sort by Timestamp desc
union (
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("powershell.exe", "cmd.exe")
| where ProcessCommandLine has_any ("\\Device\\HarddiskVolume", "\\\\.\\PhysicalDrive", "\\\\.\\Harddisk", "CreateFile.*\\\\.\\")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName
| sort by Timestamp desc
) high severity
low confidence
Data Sources
Process: Process Creation Drive: Drive Access Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Disk imaging and forensic tools that use raw disk access (dd, FTK Imager, Autopsy) for legitimate forensic analysis
- System administrators using diskpart for legitimate disk partitioning and management operations
- Drive encryption software (BitLocker, VeraCrypt) that accesses raw disk sectors during encryption
- Virtual machine software that uses raw disk access for virtual disk management operations
Last updated: 2026-04-21 Research depth: deep
References (4)
- https://attack.mitre.org/techniques/T1564/005/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.005/T1564.005.md
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064459/Equation_group_questions_and_answers.pdf
- https://securelist.com/the-penquin-turla/67962/
Unlock Pro Content
Get the full detection package for T1564.005 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1564Hide ArtifactsRelated Sub-techniques
T1564.001Hidden Files and DirectoriesT1564.002Hidden UsersT1564.003Hidden WindowT1564.004NTFS File AttributesT1564.006Run Virtual InstanceT1564.007VBA StompingT1564.008Email Hiding RulesT1564.009Resource ForkingT1564.010Process Argument SpoofingT1564.011Ignore Process InterruptsT1564.012File/Path ExclusionsT1564.013Bind MountsT1564.014Extended Attributes