Files
cti/enterprise-attack/attack-pattern/attack-pattern--28170e17-8384-415c-8486-2e6b294cb803.json
2026-04-27 15:21:34 -04:00

84 lines
5.5 KiB
JSON

{
"type": "bundle",
"id": "bundle--92754ddf-eab9-4224-855e-3c89b0e0956c",
"spec_version": "2.0",
"objects": [
{
"type": "attack-pattern",
"id": "attack-pattern--28170e17-8384-415c-8486-2e6b294cb803",
"created": "2021-06-23T20:00:27.600Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": true,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1562/009",
"external_id": "T1562.009"
},
{
"source_name": "BleepingComputer REvil 2021",
"description": "Abrams, L. (2021, March 19). REvil ransomware has a new \u2018Windows Safe Mode\u2019 encryption mode. Retrieved June 23, 2021.",
"url": "https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/"
},
{
"source_name": "Cybereason Nocturnus MedusaLocker 2020",
"description": "Cybereason Nocturnus. (2020, November 19). Cybereason vs. MedusaLocker Ransomware. Retrieved June 23, 2021.",
"url": "https://www.cybereason.com/blog/medusalocker-ransomware"
},
{
"source_name": "Microsoft Bootcfg",
"description": "Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021.",
"url": "https://docs.microsoft.com/windows-server/administration/windows-commands/bootcfg"
},
{
"source_name": "Microsoft bcdedit 2021",
"description": "Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021.",
"url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/bcdedit"
},
{
"source_name": "Microsoft Safe Mode",
"description": "Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021.",
"url": "https://support.microsoft.com/en-us/windows/start-your-pc-in-safe-mode-in-windows-10-92c27cff-db89-8644-1ce4-b3e5e56fe234"
},
{
"source_name": "CyberArk Labs Safe Mode 2016",
"description": "Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.",
"url": "https://www.cyberark.com/resources/blog/cyberark-labs-from-safe-mode-to-domain-compromise"
},
{
"source_name": "Sophos Snatch Ransomware 2019",
"description": "Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021.",
"url": "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2026-04-14T22:54:34.011Z",
"name": "Safe Mode Boot",
"description": "Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Safe Mode)(Citation: Sophos Snatch Ransomware 2019)\n\nAdversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit 2021)\n\nAdversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: Sophos Snatch Ransomware 2019)(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason Nocturnus MedusaLocker 2020)(Citation: BleepingComputer REvil 2021)",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "stealth"
}
],
"x_mitre_attack_spec_version": "3.2.0",
"x_mitre_contributors": [
"Jorell Magtibay, National Australia Bank Limited",
"Kiyohito Yamamoto, RedLark, NTT Communications",
"Yusuke Kubo, RedLark, NTT Communications"
],
"x_mitre_deprecated": false,
"x_mitre_domains": [
"enterprise-attack"
],
"x_mitre_is_subtechnique": true,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_platforms": [
"Windows"
],
"x_mitre_version": "1.1"
}
]
}