Post

Uncovering Time Stomping in Windows A Deep Dive into Anti-Forensics with NTFS

In the world of digital forensics, attackers are constantly trying to cover their tracks—and one subtle but powerful method they use is time stomping. It’s an anti-forensic technique designed to manipulate file timestamps, hiding the true timeline of malicious activity. But thanks to the structure of the NTFS file system, we as analysts can still find traces of deception—if we know where to look.

Why Attackers Hide in System Folders

One of the most common places attackers try to hide malware is in the C:\Windows\System32 folder or similar system directories. These locations are filled with legitimate binaries and DLLs that Windows relies on. Dropping malware in here helps it blend into the noise.

But this strategy has a weak point: file modification dates. Most legitimate files in this folder were last modified when Windows was installed or updated. So if a malicious file was added recently, it sticks out like a sore thumb—and that’s exactly what analysts are trained to spot.

What is Time Stomping?

To prevent detection, attackers change the timestamps of the malicious file—a technique known as time stomping. This involves altering the file’s creation, modification, and access timestamps to mimic legitimate system files.

This can be done easily in PowerShell using Windows API methods like this:

1
2
3
4
$path = "C:\Windows\System32\mimikatz.exe"
(Get-Item $path).CreationTime = '01/01/2020 12:00:00'
(Get-Item $path).LastWriteTime = '01/01/2020 12:00:00'
(Get-Item $path).LastAccessTime = '01/01/2020 12:00:00'

With just a few lines of code, the file now looks like it’s been there for years—even if it was dropped on 2025.

In the first image below, we observe a suspicious file, mimikatz.exe, placed in the C:\Windows\System32 directory. Its Date Modified is 31/03/2025 14:50 and Date Created is 31/03/2025 14:09.

In the second part of the screenshot below, we see the same file after a time stomping operation has been performed using PowerShell. Now, both Date Modified and Date Created are set to 01/01/2020 12:00, which gives the impression that the file has been there for years.

The NTFS Advantage for Forensic Analysts

Here’s where NTFS (New Technology File System) gives us the upper hand.

NTFS stores multiple sets of timestamps across different attributes. These are the main ones to know:

  • $STANDARD_INFORMATION – Contains the timestamps used by Windows Explorer and most standard tools. This is what attackers usually modify.

  • $FILE_NAME – Contains a second, independent set of timestamps associated with the file name. File name time-stamping is harder to tamper with, as it’s not affected by typical Windows API calls.

Even if an attacker changes the $STANDARD_INFORMATION timestamps, they usually leave behind discrepancies in the $STANDARD_INFORMATION attribute.

Using the Master File Table (MFT) to Detect Time Stomping

The Master File Table (MFT) is a core structure in NTFS that tracks every file and folder on the volume. Each file has an MFT entry that contains metadata including both $STANDARD_INFORMATION and $FILE_NAME timestamps.

Here’s a practical approach to detect time stomping:

#1 Extract the MFT from the target system using Kape tool

#2 Use a tool like MFTECmd by Eric Zimmerman to parse MFT entries.and export a timeline by converting the MFT to a bodyfile using MFTECmd --body.

1
MFTECmd.exe -f "C:\Users\Chamindu\Desktop\MFT\C\$MFT" --body C:\Users\Chamindu\Desktop\MFT\C --bodyf mft.body --blf --bdl C

#3 Analyze the file of interest (e.g., a suspicious mimiktaz.exe) and compare its timestamps.

MFT Analysis with MFTECmd

The parsed output of MFTECmd for a suspicious file. and visible differences between $STANDARD_INFORMATION and $FILE_NAME timestamps.

1
MFTECmd.exe -f "C:\Users\Chamindu\Desktop\MFT\C\$MFT" --de 102073

Any indicators like zeroed microseconds in the timestamps (e.g., 2020-01-01 06:30:00.0000000), which hint that they were modified via the Windows API.

Case Example: Timestamp Mismatch Revealing the Truth

Let’s say you’ve collected the MFT and are analyzing a suspicious binary named mimiktaz.exe. Here’s what you observe:

  • STANDARD INFORMATION timestamps show 2020-01-01 06:30:00.0000000

  • FILE NAME timestamps show 2025-03-31 09:19:46.7950679

The microseconds in $FILE_NAME look natural, while the $STANDARD_INFORMATION timestamps are all rounded. This tells us that someone manually altered the timestamp using a limited API.

👉 The mismatch between these two attributes is a key indicator of anti-forensic tampering.

This is important: The Windows API used in most time stomping techniques doesn’t support setting precise microsecond values, so the result often looks like 2020-01-01 12:00:00.0000000. In real-world scenarios, NTFS-generated timestamps almost never have all-zero microseconds. This makes the appearance of rounded timestamps a strong indicator of manual manipulation, pointing to possible time stomping activity.

Conclusion: Time Stomping Leaves Clues

Time stomping is a clever way for attackers to hide in plain sight. But they often overlook the redundant timestamp storage in NTFS. By analyzing the MFT and comparing multiple timestamp sources, forensic analysts can detect even subtle manipulations.

TL;DR

  • Attackers drop malware in system folders and use time stomping to make it look old.
  • NTFS stores multiple timestamp attributes some of which are harder to modify.
  • Tools like MFTECmd can reveal timestamp mismatches that point to tampering.
  • Rounded timestamps with all zeros = suspicious.
  • Always compare $STANDARD_INFORMATION vs $FILE_NAME!

If you’re doing a forensic investigation on NTFS systems, don’t trust timestamps at face value. Dig deeper—and you’ll often find the truth hidden in plain sight.

A skilled attacker can manipulate timestamps—but NTFS records the truth in multiple places. As analysts, it’s our job to ask: “Does this timeline make sense?” and dig until we’re sure.

This post is licensed under CC BY 4.0 by the author.

Trending Tags