
Summary
The detection rule for 'Fsutil Drive Enumeration' targets the use of the 'fsutil.exe' utility commonly leveraged by attackers to enumerate drives connected to the Windows operating system. Through the command line, attackers can issue calls to 'fsutil fsinfo drives' which lists all connected drives. This behavior can be indicative of malicious reconnaissance activities where an attacker is gathering information about the system's environment. The rule specifies both process creation events for 'fsutil.exe' and checks for command line arguments containing the word 'drives'. It operates under the assumption that discovery operations on a network or host should be monitored carefully as they may signal preparatory steps for further exploitation. This rule is part of broader efforts to detect malicious enumeration methods that align with tactics used by well-known threat actors, such as Turla, who have previously employed similar techniques for information gathering as part of their operational protocols.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-03-29