Skip to content

Hide Navigation Hide TOC

Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08)

The alteration of a drive letter, mount point, or other attributes of a data storage device, which could involve reassignment, renaming, permissions changes, or other modifications. Examples:

  • Drive Letter Reassignment: A USB drive previously assigned E:\ is reassigned to D:\ on a Windows machine.
  • Mount Point Change: On a Linux system, a mounted storage device at /mnt/external is moved to /mnt/storage.
  • Drive Permission Changes: A shared drive's permissions are modified to allow write access for unauthorized users or processes.
  • Renaming of a Drive: A network drive labeled "HR_Share" is renamed to "Shared_Resources."
  • Modification of Cloud-Integrated Drives: A cloud storage mount such as Google Drive is modified to sync only specific folders.

This data component can be collected through the following measures:

Windows Event Logs

  • Relevant Events:
    • Event ID 98: Indicates changes to a volume (e.g., drive letter reassignment).
    • Event ID 1006: Logs permission modifications or changes to removable storage.
  • Configuration: Enable "Storage Operational Logs" in the Event Viewer: Applications and Services Logs > Microsoft > Windows > Storage-Tiering > Operational

Linux System Logs

  • Auditd Configuration: Add audit rules to track changes to mounted drives: auditctl -w /mnt/ -p w -k drive_modification
  • Command-Line Monitoring: Use dmesg or journalctl to observe drive modifications.

macOS System Logs

  • Unified Logs: Collect mount or drive modification events: log show --info | grep "Volume modified"
  • Command-Line Monitoring: Use diskutil to track changes:

Endpoint Detection and Response (EDR) Tools

  • Configure policies in EDR solutions to monitor and log changes to drive configurations or attributes.

SIEM Tools

  • Aggregate logs from multiple systems into a centralized platform like Splunk to correlate events and alert on suspicious drive modification activities.
Cluster A Galaxy A Cluster B Galaxy B Level
Disk Structure Wipe - T1561.002 (0af0ca99-357d-4ba1-805f-674fdfb7bef9) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Disk Content Wipe - T1561.001 (fb640c43-aa6b-431e-a961-a279010424ac) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Pre-OS Boot - T1542 (7f0ca133-88c4-40c6-a62f-b3083a7fbc2e) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Rootkit - T1014 (0f20e3cb-245b-4a61-8a91-2d93f7cb0e9b) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Bootkit - T1542.003 (1b7b1806-7746-41a1-a35d-e48dae25ddba) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Disk Wipe - T1561 (1988cc35-ced8-4dad-b2d1-7628488fa967) Attack Pattern Drive Modification (4dcd8ba3-2075-4f8b-941e-39884ffaac08) mitre-data-component 1
Disk Structure Wipe - T1561.002 (0af0ca99-357d-4ba1-805f-674fdfb7bef9) Attack Pattern Disk Wipe - T1561 (1988cc35-ced8-4dad-b2d1-7628488fa967) Attack Pattern 2
Disk Content Wipe - T1561.001 (fb640c43-aa6b-431e-a961-a279010424ac) Attack Pattern Disk Wipe - T1561 (1988cc35-ced8-4dad-b2d1-7628488fa967) Attack Pattern 2
Pre-OS Boot - T1542 (7f0ca133-88c4-40c6-a62f-b3083a7fbc2e) Attack Pattern Bootkit - T1542.003 (1b7b1806-7746-41a1-a35d-e48dae25ddba) Attack Pattern 2