Detection rules › Sigma

Fsutil Suspicious Invocation

Severity
high
Author
Ecco, E.M. Anhaus, oscd.community
Source
upstream

Detects suspicious parameters of fsutil (deleting USN journal, configuring it with small size, etc). Might be used by ransomwares during the attack (seen by NotPetya and others).

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1070 Indicator Removal
ImpactT1485 Data Destruction

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\fsutil.exe'
OriginalFileName: fsutil.exe

Stage 2: all of selection_cli

or:
CommandLine|contains: createjournal
CommandLine|contains: deletejournal
CommandLine|contains: setZeroData

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • createjournal
  • deletejournal
  • setZeroData
Imageends_with
  • \fsutil.exe corpus 4 (sigma 4)
OriginalFileNameeq
  • fsutil.exe corpus 2 (sigma 2)