heroui logo

Fsutil Suspicious Invocation

Sigma Rules

View Source
Summary
This rule identifies suspicious activities involving the 'fsutil.exe' command on Windows systems. It specifically looks for certain command line parameters that may indicate malicious behavior, such as deleting or creating the USN journal or manipulating its configuration to a minimal size. These actions are commonly associated with ransomware operations, exemplified by malware variants like NotPetya. The detection logic operates on the process creation events, monitoring any invocation of 'fsutil.exe' with targeted command-line arguments. The rule aims to enhance security visibility and provide early warnings about potential ransomware activity, making it a vital part of a proactive defense strategy.
Categories
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1070
Created: 2019-09-26