heroui logo

Fsutil fsinfo execution (EDR)

Anvilogic Forge

View Source
Summary
The detection rule targets the execution of the 'fsutil' command with the 'fsinfo' argument, which adversaries may use to gather information about peripheral devices and components connected to a computer system. This activity is associated with reconnaissance actions that could reveal details about attached devices such as storage drives, printers, and other peripherals. The rule captures events related to process creation and network connections, filtering for instances where 'fsutil' is called with 'fsinfo'. It is particularly relevant to threat actors like APT29, also known as Nobelium or Cozy Bear, which have been known to utilize this technique to support their operations. The detection logic is structured for Splunk and leverages endpoint data to detect the specified command execution, thereby aiding in identifying potential unauthorized reconnaissance activities on endpoints within a network.
Categories
  • Endpoint
Data Sources
  • Process
  • User Account
  • Command
ATT&CK Techniques
  • T1120
Created: 2025-03-28