Local Storage Discovery via Drive Enumeration and Filesystem Probing

Technique Detected:  Local Storage Discovery | T1680

ID: DET0188
Domains: Enterprise
Analytics: AN0536, AN0537, AN0538, AN0539
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0536

Drive enumeration using PowerShell (Get-PSDrive), wmic logicaldisk, or Win32 API indicative of local volume enumeration by non-admin users or executed outside of baseline system inventory scripts.

Log Sources
Data Component Name Channel
Process Creation (DC0032) WinEventLog:Sysmon EventCode=1
Mutable Elements
Field Description
user_context Non-system accounts performing drive enumeration may be higher fidelity indicators
parent_process_name Baseline parent-child process lineage can help distinguish admin tools from malicious scripts

AN0537

Abnormal use of lsblk, fdisk -l, lshw -class disk, or parted by non-admin users or within non-interactive shells suggests suspicious disk enumeration activity.

Log Sources
Data Component Name Channel
Process Creation (DC0032) auditd:SYSCALL execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)
Command Execution (DC0064) auditd:EXECVE command line arguments containing lsblk, fdisk, parted
Mutable Elements
Field Description
TTY_type Detection can exclude interactive TTY sessions to reduce false positives from admin usage
shell_parent Differentiate between interactive user shells vs. script-based execution

AN0538

Disk enumeration via diskutil list or system_profiler SPStorageDataType run outside of user login or not associated with system inventory tools

Log Sources
Data Component Name Channel
Process Creation (DC0032) macos:unifiedlog process launch of diskutil or system_profiler with SPStorageDataType
Command Execution (DC0064) macos:unifiedlog log messages related to disk enumeration context or Terminal session
Mutable Elements
Field Description
launch_agent_context Unexpected use of disk enumeration tools from GUI apps or LaunchAgents may indicate abuse
volume_name_filter Filter known baseline volume names or identifiers used by common device configurations

AN0539

Use of esxcli storage or vim-cmd vmsvc/getallvms by unusual sessions or through interactive shells unrelated to administrative maintenance tasks.

Log Sources
Data Component Name Channel
Process Creation (DC0032) esxi:hostd execution of esxcli with args matching 'storage', 'filesystem', 'core device list'
User Account Authentication (DC0002) esxi:auth interactive shell or SSH access preceding storage enumeration
Mutable Elements
Field Description
ssh_source_ip Restrict alerts to unexpected remote sessions accessing host storage commands
esxcli_command_scope Tailor detection based on subcommands more likely to be abused