heroui logo

Fsutil Zeroing File

Splunk Security Content

View Source
Summary
This detection rule identifies instances of the 'fsutil' command being executed with the 'setzerodata' parameter, which is used to zero out a target file on Windows systems. This behavior is particularly significant in the context of ransomware operations, such as those by LockBit, as it serves to erase traces of malicious activity post-encryption. The rule leverages data from Endpoint Detection and Response (EDR) agents, capturing relevant process names and command-line arguments through Sysmon Event ID 1, Windows Event Log Security Event ID 4688, and CrowdStrike's ProcessRollup2. The threat of this activity lies in its ability to obstruct forensic investigations and hinder effective incident response measures by potentially removing evidence left behind by attackers.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Command
ATT&CK Techniques
  • T1070
Created: 2024-11-13