Skip to content

Hide Navigation Hide TOC

Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f)

The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples:

  • USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter E:\ on a Windows machine.
  • Network Drive Mapping: A network share \\server\share is mapped to the drive Z:\.
  • Virtual Drive Creation: A virtual disk is mounted on /mnt/virtualdrive using an ISO image or a virtual hard disk (VHD).
  • Cloud Storage Mounting: Google Drive is mounted as G:\ on a Windows machine using a cloud sync tool.
  • External Storage Integration: An external HDD or SSD is connected and assigned /mnt/external on a Linux system.

This data component can be collected through the following measures:

Windows Event Logs

  • Relevant Events:
    • Event ID 98: Logs the creation of a volume (mount or new drive letter assignment).
    • Event ID 1006: Logs removable storage device insertions.
  • Configuration: Enable "Removable Storage Events" in the Group Policy settings: Computer Configuration > Administrative Templates > System > Removable Storage Access

Linux System Logs

  • Command-Line Monitoring: Use dmesg or journalctl to monitor mount events.

  • Auditd Configuration: Add audit rules to track mount points.

  • Logs can be reviewed in /var/log/audit/audit.log.

macOS System Logs

  • Unified Logs: Monitor system logs for mount activity:
  • Command-Line Tools: Use diskutil list to verify newly created or mounted drives.

Endpoint Detection and Response (EDR) Tools

  • EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events.

SIEM Tools

  • Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.
Cluster A Galaxy A Cluster B Galaxy B Level
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Hardware Additions - T1200 (d40239b3-05ff-46d8-9bdd-b46d13463ef9) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Exfiltration over USB - T1052.001 (a3e1e6c5-9c74-4fc0-a16c-a9d228c17829) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Exfiltration Over Physical Medium - T1052 (e6415f09-df0e-48de-9aba-928c902b7549) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Input Injection - T1674 (63e3d25c-d57d-407d-8e6a-2cecd71f90be) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Communication Through Removable Media - T1092 (64196062-5210-42c3-9a02-563a0d1797ef) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Replication Through Removable Media - T1091 (3b744087-9945-4a6f-91e8-9dbceda417a4) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Remote Access Tools - T1219 (4061e78c-1284-44b4-9116-73e4ac3912f7) Attack Pattern 1
Drive Creation (3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f) mitre-data-component Remote Access Hardware - T1219.003 (a9fb6b3f-4a3c-4703-a4f1-f55f83d1e017) Attack Pattern 1
Exfiltration over USB - T1052.001 (a3e1e6c5-9c74-4fc0-a16c-a9d228c17829) Attack Pattern Exfiltration Over Physical Medium - T1052 (e6415f09-df0e-48de-9aba-928c902b7549) Attack Pattern 2
Remote Access Tools - T1219 (4061e78c-1284-44b4-9116-73e4ac3912f7) Attack Pattern Remote Access Hardware - T1219.003 (a9fb6b3f-4a3c-4703-a4f1-f55f83d1e017) Attack Pattern 2