Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF025
- Created: 24th July 2025
- Updated: 28th July 2025
- Contributor: Numan Ahmad
Delayed Execution Triggers
Subjects may embed deferred execution logic into scripts, binaries, or automation systems to evade real-time scrutiny and frustrate future investigation. These anti-forensic techniques decouple the triggering event from the subject’s active presence in the environment—delaying execution until the subject has departed or organizational oversight has waned.
Common methods include:
- Time-Based Logic: Conditional execution paths that activate only after a predefined system date or time threshold (e.g.,
if (date > X)). - Extended Sleep or Delay Functions: Use of long-duration
sleep,timeout, ordelaycalls to stall execution for hours or days. - Abuse of Scheduled Task Frameworks: Planting jobs in
cron, Windows Task Scheduler, or enterprise orchestration systems with future execution dates, often disguised through misleading naming or non-obvious triggers.
These deferred actions are designed to blend into the environment and avoid correlation with the subject's session, user ID, or system interaction timeline. They may be used to execute sabotage, establish persistence, or exfiltrate data long after departure—frustrating incident response efforts and increasing dwell time before detection.