ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: DT132
  • Created: 28th June 2025
  • Updated: 28th June 2025
  • Platform: Windows
  • Contributor: The ITM Team

Snipping Tool TempState\Recordings

In Windows 11 the Snipping Tool utility, when the “Automatically save original screen recordings” setting is manually toggled to disabled, will continue to save recordings to the %USER%\AppData\Local\Packages\Microsoft.ScreenSketch_8wekyb3d8bbwe\TempState\Recordings directory. This is a fallback artifact from DT131 Snipping Tool Cached Recordings. This artifact can potentially provide an insight into activities conducted by the subject, such as data exfiltration via screen recordings.

Sections

ID Name Description
PR028.002Capture via Screen Recording

The subject initiates a screen recording session to continuously capture visual activity on their workstation. Unlike isolated screenshots, screen recordings provide a persistent visual record that may include system navigation, data access patterns, command execution, or user interactions with sensitive tools and content.

 

Screen recordings are commonly used to circumvent restrictions on file downloads, printing, or copy-paste functionality. They allow subjects to preserve dynamic content, such as chat conversations and video meetings, that may not be available later or that are heavily monitored in other forms. The resulting files are often compressed and exported in standard formats (e.g., .mp4, .mov) and may be exfiltrated at a later time.

 

Subjects may use operating system–native tools (e.g., Xbox Game Bar on Windows, QuickTime on macOS) or third-party utilities (e.g., OBS Studio, Snagit, Loom) to conduct these recordings. Because many of these tools are not considered malicious, their use may not be flagged unless specifically configured for detection.