Windows Peripheral Device Discovery via fsutil
Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.
Attackers may leverage native operating system tools like fsutil.exe to perform reconnaissance activities within a compromised environment. The fsutil fsinfo drives command provides information about connected drives, including removable media, mapped network drives, and backup locations. Discovery of these devices can help adversaries identify valuable data stores for exfiltration or encryption as part of a broader attack campaign. This command can be run interactively or via automated scripts, making it a versatile tool for post-exploitation activities. Defenders should monitor for unusual execution of fsutil with the fsinfo drives arguments, particularly when executed by non-administrative users or from unusual locations.
Attack Chain
- An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).
- The attacker executes
fsutil.exevia command line or script. - The
fsutilcommand uses thefsinfosubcommand. - The
fsinfosubcommand uses thedrivesargument to list connected drives. - The system returns a list of attached drives and their types (e.g., local, network, removable).
- The attacker analyzes the output to identify potentially valuable targets.
- The attacker moves laterally to access identified drives.
- The attacker exfiltrates sensitive data or deploys ransomware on the identified drives.
Impact
Successful discovery of peripheral devices can lead to the identification of backup locations, mapped network drives, and removable media containing sensitive information. This information enables attackers to expand their reach within the compromised environment and increase the potential for data theft, encryption, or destruction. The low severity reflects the fact that this activity on its own is simply reconnaissance; the actual damage comes from subsequent actions.
Recommendation
- Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious execution of
fsutil.exe(see below). - Enable process creation logging with command line arguments to capture
fsutilexecutions (see setup instructions in the Overview). - Investigate any process executions of
fsutil.exewhere the parent process is unexpected or the user context is unusual (see Triage and Analysis).
Detection coverage 2
Detect Peripheral Device Discovery via fsutil.exe
lowDetects the execution of fsutil.exe with arguments related to peripheral device discovery.
Detect Peripheral Device Discovery via fsutil.exe (PE Original Filename)
lowDetects the execution of fsutil.exe by checking the PE original filename for obfuscated execution.
Detection queries are kept inside the platform. Get full rules →