It's complicated. VeraCrypt volumes themselves appear to be random data - they're the output from an encryption routine which should be indistinguishable from random data, barring some flaw in the algorithm or implementation of the algorithm - and that applies for both volumes within files and for system encryption.
VeraCrypt accepts a password, then tries all supported key derivation functions, all supported encryption algorithms and all supported key lengths against the first 512 bytes of the volume. If one of these results in the first 4 bytes of decrypted data being the string "VERA", it is assumed that the methods used are correct, and the rest of the header is used to decrypt the rest of the volume. This means that it doesn't need to store information about the cipher used, or the size of key expected (See https://www.veracrypt.fr/en/Encryption%20Scheme.html for the full details).
However, if you have set up system encryption, the routine to perform this decryption is stored on the first track of the boot drive - this is unencrypted, else it couldn't be run prior to decryption. You don't actually need to have this installed - you could use a rescue disk to boot the system far enough to decrypt the volume, for instance - in which case only encrypted data is left on the drive.
In this case, the only evidence of VeraCrypt (or similar software) being used is the large blob of random data. The lack of a decryption method could be considered suspicious, especially in cases such as border checks, where it would be unusual to carry a laptop with a drive which had been overwritten with random data. On the other hand, having an encrypted drive, with the appropriate methods to decrypt for use is standard procedure for many business users (although this may normally be BitLocker rather than VeraCrypt).
For file based volumes, the presence of a file apparently containing only random data could be considered suspicious - most legitimate files have some sort of detectable header - even if VeraCrypt itself is not installed on the device. However, they don't have anything to indicate that they're VeraCrypt volumes - for example, I have a bunch of files which are simply dumps of random values from /dev/random
on my work system, which I use for testing upload systems which claim to allow specific file types (by renaming them to the expected type, it tests whether the system is checking headers, or relying on file extensions, without risking accidentally using an accepted header type). There is nothing which could distinguish these from VeraCrypt volumes, other than that there is no (known) password which decrypts them to produce "VERA" at the start.
So:
- For system encryption, there is a pre-boot decryption routine to allow booting without a rescue disk
- For other types of volume, there isn't anything directly added by VeraCrypt, but the presence of VeraCrypt itself and a lack of obvious volumes could suggest something is hidden
- For plausible deniability, the presence of VeraCrypt itself is not intended to be secret, but rather whether a specific bunch of random data within a VeraCrypt volume is another VeraCrypt volume or not
- While direct evidence is hard to find, it may be possible to look at a lack of data and draw conclusions that something is hidden - see https://www.veracrypt.fr/en/Security%20Requirements%20for%20Hidden%20Volumes.html