Detection of Malicious Code in Boot Memory (Integrity Failure)

Detection of malicious code being executed or loaded into boot memory, indicated by a failed memory integrity check.

STIX Pattern

[x-opencti-memory:block = 'boot' AND x-opencti-memory:integrity_check = 'failed']

SPARTA TTPs

ID Name Description
EX-0004 Compromise Boot Memory Threat actors may manipulate boot memory in order to execute malicious code, bypass internal processes, or DoS the system. This technique can be used to perform other tactics such as Defense Evasion.
EX-0010.04 Bootkit Adversaries may use bootkits to persist on systems and evade detection. Bootkits reside at a layer below the operating system and may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.