<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fsutil — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/fsutil/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/fsutil/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows USN Journal Deletion via Fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</guid><description>Adversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.</description><content:encoded><![CDATA[<p>Attackers can use the <code>fsutil.exe</code> utility to delete the volume USN Journal in Windows. The USN Journal tracks changes made to files and directories on a disk volume, including metadata for file creation, deletion, modification, and permission changes. Deleting this journal can hinder forensic analysis by removing evidence of file operations. This technique is used to cover tracks and evade detection after an initial compromise. This activity is often observed during the post-exploitation phase of an attack, where adversaries attempt to remove traces of their presence and actions on the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>fsutil.exe</code> via command line.</li>
<li>The command <code>fsutil usn deletejournal /D [volume]</code> is used to delete the USN Journal on the specified volume.</li>
<li>The operating system processes the command, removing the USN Journal.</li>
<li>Subsequent file system activity is no longer recorded in the USN Journal.</li>
<li>The attacker performs further actions on the system, such as lateral movement or data exfiltration.</li>
<li>Forensic analysis is hampered due to the missing USN Journal entries.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of the USN Journal impairs forensic investigations and incident response efforts. Without the USN Journal, analysts may struggle to determine the full scope of an intrusion, including files created, modified, or deleted by the attacker. This can lead to incomplete remediation and a higher risk of reinfection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect USN Journal Deletion via Fsutil&rdquo; to your SIEM to identify this specific behavior.</li>
<li>Monitor process execution events for <code>fsutil.exe</code> with arguments related to &ldquo;deletejournal&rdquo; and &ldquo;usn&rdquo; to detect potential attempts to delete the USN Journal.</li>
<li>Enable Sysmon process creation logging to capture the execution of <code>fsutil.exe</code> with the relevant arguments.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>fsutil</category><category>usn journal</category></item><item><title>Windows Peripheral Device Discovery via fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</guid><description>Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.</description><content:encoded><![CDATA[<p>Attackers may leverage native operating system tools like <code>fsutil.exe</code> to perform reconnaissance activities within a compromised environment. The <code>fsutil fsinfo drives</code> command provides information about connected drives, including removable media, mapped network drives, and backup locations. Discovery of these devices can help adversaries identify valuable data stores for exfiltration or encryption as part of a broader attack campaign. This command can be run interactively or via automated scripts, making it a versatile tool for post-exploitation activities. Defenders should monitor for unusual execution of <code>fsutil</code> with the <code>fsinfo drives</code> arguments, particularly when executed by non-administrative users or from unusual locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes <code>fsutil.exe</code> via command line or script.</li>
<li>The <code>fsutil</code> command uses the <code>fsinfo</code> subcommand.</li>
<li>The <code>fsinfo</code> subcommand uses the <code>drives</code> argument to list connected drives.</li>
<li>The system returns a list of attached drives and their types (e.g., local, network, removable).</li>
<li>The attacker analyzes the output to identify potentially valuable targets.</li>
<li>The attacker moves laterally to access identified drives.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware on the identified drives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful discovery of peripheral devices can lead to the identification of backup locations, mapped network drives, and removable media containing sensitive information. This information enables attackers to expand their reach within the compromised environment and increase the potential for data theft, encryption, or destruction. The low severity reflects the fact that this activity on its own is simply reconnaissance; the actual damage comes from subsequent actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious execution of <code>fsutil.exe</code> (see below).</li>
<li>Enable process creation logging with command line arguments to capture <code>fsutil</code> executions (see setup instructions in the Overview).</li>
<li>Investigate any process executions of <code>fsutil.exe</code> where the parent process is unexpected or the user context is unusual (see Triage and Analysis).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>fsutil</category></item></channel></rss>