heroui logo

Fsutil fsinfo execution (WinEvent)

Anvilogic Forge

View Source
Summary
The detection rule focuses on the execution of the `fsutil` command with the `fsinfo` parameter, which is used to gather information about attached peripheral devices on a Windows system. Adversaries may utilize this information gathering technique to probe for device functionalities like keyboards, printers, or removable storage systems as part of their reconnaissance efforts. The rule is designed to capture and log instances where the `fsutil` command is invoked with `fsinfo`, highlighting potentially malicious activities associated with known threat actors such as APT29 (also known as Nobelium or Cozy Bear) and malware families like Alphv/BlackCat. The Splunk logic specifies searching Windows event logs for Event Code 4688 related to process creation, filtering the output for relevant fields to allow quick analysis of user, host, and process details.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1120
Created: 2025-03-28