USD ($)
$
United States Dollar
Euro Member Countries
India Rupee

Host-Level Artifacts of Compromise

Lesson 32/47 | Study Time: 20 Min

Host-level artifacts of compromise represent persistent indicators left by attackers on compromised systems, including unauthorized files, registry modifications, anomalous processes, and configuration changes that reveal infection, persistence, and execution activity in computer and cyber forensics investigations.

These artifacts persist across reboots and provide concrete evidence of dwell time, capabilities, and tactics, complementing volatile memory analysis with disk-based proof. Identifying them enables investigators to map attack timelines, attribute behaviors to threat actors, and develop targeted mitigations against sophisticated intrusions.

Persistence Mechanisms

Persistence artifacts ensure malware survives reboots and system changes.

Registry Run/RunOnce keys (Windows: HKLM\Software\Microsoft\Windows\CurrentVersion\Run) execute payloads on startup. Scheduled tasks (schtasks /query) launch at triggers; WMI event subscriptions persist via repositories.

Linux cron jobs (/var/spool/cron) and systemd timers provide similar functionality.

Suspicious Files and Paths

Unusual executables in system directories signal compromise.

Temporary folders (C:\Windows\Temp, %TEMP%) hold droppers; recent DLLs in C:\Windows\System32 indicate injection. Linux /tmp, /dev/shm executables warrant scrutiny. Mutexes (hidden handles) prevent multiple infections.

High-entropy executables or renamed system tools (ps.exe) flag packing.

Process and Service Anomalies

Runtime indicators expose active compromise.

Parent-child mismatches (svchost.exe spawning cmd.exe) suggest injection. Orphaned processes (no parent) or high-privilege unexpected binaries indicate escalation. Services with recent creation dates (sc query) often serve C2.

Linux: ps aux reveals zombie processes, unusual binaries in /proc.

Registry and Configuration Changes

System settings alterations enable control.

Windows: Recent UserInit, Winlogon values; policy changes (Secedit). BootExecute registry for pre-OS persistence. Linux: Modified /etc/passwd, sudoers; unusual kernel modules (lsmod).

ShimCache (AppCompatCache) proves execution despite deletions.

Network and File Artifacts


Linux: ~/.ssh/authorized_keys, bash_history commands.

Detection and Analysis Workflow

Systematic hunting uncovers artifacts.


1. Baseline normal (Sysinternals Autoruns).

2. Scan with Sigma/YARA rules.

3. Timeline correlation (bodyfile from multiple sources).

4. Volatility for memory confirmation.

5. Extract IOCs (hashes, paths) for hunting.


Tools: Autoruns, Sysmon (Event ID 1 processes), Velociraptor collectors.

In APTs: Persistence (scheduled task) → Execution (prefetch) → C2 (netscan) traces full lifecycle.

Alexander Cruise

Alexander Cruise

Product Designer
Profile

Class Sessions

1- Evolution of Digital Crime and Cyber Forensics 2- Key Terminology and Scope 3- Digital Evidence Lifecycle and Forensic Principles 4- Legal, Regulatory, and Standards Context 5- Roles and Career Paths in Computer and Cyber Forensics 6- Structured Digital Investigation Methodologies 7- Scoping and Planning an Investigation 8- Evidence Sources in Enterprise Environments 9- Documentation, Case Notes, and Evidence Tracking 10- Working with Multidisciplinary Teams 11- Computer and Storage Architecture for Investigators 12- File System Structures and Artifacts 13- File and Artifact Recovery 14- Common User-Activity Artifacts 15- Principles of Forensically Sound Acquisition 16- Acquisition Strategies 17- Volatile vs Non-Volatile Data Acquisition 18- Handling Encrypted and Locked Systems 19- Evidence Handling, Transport, and Storage 20- Windows Forensics Essentials 21- Linux and Unix-Like System Forensics 22- macOS and Modern Desktop Environments 23- Memory Forensics Concepts 24- Timeline Construction Using OS and Memory Artifacts 25- Network Forensics Fundamentals 26- Enterprise Logging and Telemetry 27- Cloud Forensics (IaaS, PaaS, SaaS) 28- Email and Messaging Investigations 29- Timeline Building from Heterogeneous Logs 30- Modern Malware and Ransomware Landscape 31- Malware Forensics Concepts 32- Host-Level Artifacts of Compromise 33- Ransomware Incident Artifacts 34- Dark Web and Anonymous Network Forensics 35- Common Anti-Forensics Techniques 36- Detection of Anti-Forensics 37- Countering Anti-Forensics 38- Resilient Evidence Collection Strategies 39- Incident Response Frameworks and Phases 40- Forensics-Driven Incident Response 41- Threat Hunting Linked with Forensics 42- Post-Incident Activities 43- Forensic Report Structure 44- Writing for Multiple Audiences 45- Presenting and Defending Findings 46- Ethics, Confidentiality, and Professional Conduct 47- Continuous Learning and Certification Pathways