Could emulating a virtual environment stop some malware from infecting the system?
Yes. Also, creating fake VM artifacts is not the only way to stop malware from executing. You could also create fake mutex objects or certain registry keys that malware oftentimes creates in order to avoid re-infecting the same machine. And there are a lot of other ways, depending on the malware's internal workings.
Would it be a good prevention strategy?
Not really. It would be a false sense of security. Assuming the malware even has any anti-VM measures in place at all and cares to halt execution if a VM is detected (which many don't), there are still thousands of ways malware can check if it's inside a VM or not, and every malware differs. There are hundreds of millions of malware programs out there, all of which work differently, and to spend your time on all of them would not only be a massive undertaking but would still likely prove to be an unreliable defense against malware.
So no, it would not be a good prevention strategy. Your time and effort would be better spent elsewhere, such as focusing your threat model around preventing actual execution of the malware at all by using good security practices, enforcing code signing, hardening your system, reducing attack vectors, keeping everything updated, not downloading anything suspicious, etc., and you should be ok, and have no need for this prevention strategy.