ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: IF013.001
  • Created: 20th June 2024
  • Updated: 07th April 2025
  • Contributor: The ITM Team

File or Data Deletion

A subject deletes files or data that cause disruption of business operations.

Detection

ID Name Description
DT052Audit Logging

Audit Logs are records generated by systems and applications to document activities and changes within an environment. They provide an account of events, including user actions, system modifications, and access patterns.

DT038Windows Recycle Bin

On Windows 10, we can find the Recycle Bin directory for all users located at C:\$Recycle.Bin. Insider this location are sub-folders using user account SIDs for the naming convention. To get a list of user accounts on a system Windows Management Instrumentation Command (WMIC) can be used: wmic useraccount get name,SID.

Files that begin with $R followed by a random string contain the true file contents of the recycled file.

Files that begin with $I and end in the same string as the $R file counterpart contain the metadata for that specific file, such as the original filename, path, size, and timestamp of when the file was deleted.

If the user has emptied the Recycle Bin, we lose this artifact and cannot analyze it. Instead, we would need to carve these files from a disk image.