Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_fsutil_symlinkevaluation.yml
T
2022-03-16 14:35:19 +01:00

29 lines
932 B
YAML

title: Fsutil Behavior Set SymlinkEvaluation
id: c0b2768a-dd06-4671-8339-b16ca8d1f27f
status: experimental
description: |
A symbolic link is a type of file that contains a reference to another file.
This is probably done to make sure that the ransomware is able to follow shortcuts on the machine in order to find the original file to encrypt
references:
- https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware
- https://docs.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior
author: frack113
date: 2022/03/02
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: fsutil.exe
CommandLine|contains|all:
- 'behavior '
- 'set '
- 'SymlinkEvaluation'
condition: selection
falsepositives:
- Legitimate use
level: medium
tags:
- attack.execution
- attack.t1059