Attribute Manipulation (Read-Only)
Description: This technique involves changing the standard file attributes (like Read-Only, Hidden, System) of specific files or folders to hinder detection or prevent logging mechanisms from functioning correctly.
Mechanism: Uses standard Windows functionality:
File Properties GUI (Right-click > Properties > Check "Read-only" or "Hidden").
Command-line tool
attrib
(e.g.,attrib +r +h C:\path\to\file
).PowerShell commands (
Set-ItemProperty
).
Why Cheaters Use It (Screensharing Context): The most common malicious use in screensharing involves setting the Read-Only attribute (
+r
) on Prefetch files (.pf
) located inC:\Windows\Prefetch
.Prefetch Bypass: When a
.pf
file is marked as read-only, the SysMain service is prevented from updating its contents (like the Last Execution Time and Run Count) upon subsequent launches of the corresponding application. This effectively "freezes" the Prefetch entry, making a recently executed cheat appear as if it hasn't been run since the date recorded before the attribute was set, thus hiding recent activity from Prefetch analysis.Hiding Files: Setting the Hidden attribute (
+h
) is also commonly used to simply hide cheat files or related folders from default views in File Explorer.
Detection:
Checking Attributes: Directly check the attributes of suspicious files (especially
.pf
files showing old timestamps despite other execution evidence).In File Explorer (Properties > General).
In Command Prompt: Use
dir /ar C:\Windows\Prefetch
to list files with the read-only attribute, ordir /ah C:\path\
for hidden files.
USN Journal (
$UsnJrnl
): Changing file attributes (including setting Read-Only or Hidden) generates aBASIC_INFO_CHANGE | CLOSE
event in the Journal for the affected file. Finding recentBASIC_INFO_CHANGE
events specifically for.pf
files is a strong indicator of Prefetch tampering.
Last updated