What you DO have to be careful about though is what you do while stealthed around things that can see you. An innocuous background file probably doesn't edit the Access Log for instance, so be sure that no Agents, IC, or Spiders are in that part of the node before you do it. Doesn't matter how high your Stealth is, if you do something like that in front of a spider they're going to suspect something.
As a spider, if an icon like that did something out of the ordinary I'd do this: 1) Analyze, 2)Edit. If the spider can't edit the file (because it's really a persona, Agent, etc) then they know there's some hanky panky, if they can edit it, then look for the code explaining why it would do what it did and correct it.
This is why I really like it when runners try to get a legitimate icon for use in a node instead of running Stealth. It's like using the Disguise skill instead of Infiltration, with the added benefit that there is no opposed roll to see through it. Sure, they can run Analyze on it and perhaps figure out it's not the regular person using the Icon, but most of the possible questions raised could be answered socially: "Oh, different Access ID? I called out sick and am using my new commlink to telecommute today. Why's the System so high? Cause I got a top of the line link, of course. Running an Armor program? Is THAT what that program is, because I'm still learning what this thing came with. I'll deactivate it of course." Etc, etc.