heroui logo

Fsutil Behavior Set SymlinkEvaluation

Sigma Rules

View Source
Summary
The rule 'Fsutil Behavior Set SymlinkEvaluation' aims to detect potentially malicious use of the Windows command-line utility `fsutil.exe`, which may be manipulated by ransomware to change how symbolic links are evaluated in the file system. Ransomware often uses symbolic links to locate original files for encryption, and this rule monitors events where `fsutil` is invoked with parameters that adjust the behavior of symbolic link evaluation. The detection logic checks for process creations where the command line related to `fsutil.exe` includes terms indicating a change to symbolic link behavior. This helps identify and respond to potential ransomware activities, ensuring that the execution of such commands is scrutinized promptly.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-03-02