Windows EFI Volume Mount Attempt via Mountvol
Detection of attempts to mount the EFI volume on Windows systems using mountvol.exe, potentially leading to system compromise.
This detection identifies attempts to mount the EFI volume on Windows systems using the mountvol.exe utility. The EFI system partition (ESP) is a special partition crucial for system booting. Unauthorized modification of the ESP can compromise system integrity, allowing attackers to modify the system on boot. This technique is associated with attacks like PKFail. The scope of this threat involves potential compromise of Windows systems and the ability to modify the boot process for malicious purposes, affecting system integrity and security. The detection leverages process monitoring to identify suspicious use of mountvol.exe.
Attack Chain
- An attacker gains initial access to the system, potentially through social engineering or exploitation of a vulnerability.
- The attacker executes
mountvol.exewith the-Sor/Sparameter to mount the EFI volume. - The attacker gains write access to the EFI system partition.
- The attacker modifies bootloaders or other EFI executables.
- The attacker may install malicious drivers or backdoors into the EFI partition.
- The system is rebooted, triggering the malicious code within the EFI partition.
- The malicious code compromises the operating system during the boot process.
- The attacker achieves persistence and control over the system.
Impact
Successful exploitation can lead to persistent malware installation, allowing attackers to maintain control over the compromised system even after reboots or OS reinstalls. The impact includes potential data theft, system corruption, and the ability to install rootkits that are difficult to detect. If successful, the attacker can gain complete control over the system.
Recommendation
- Deploy the Sigma rule
Detect EFI Volume Mount via Mountvolto your SIEM and tune for your environment. - Monitor process execution logs for instances of
mountvol.exebeing executed with the-Sor/Sparameters. - Investigate any alerts generated by the Sigma rule, paying close attention to the parent processes and user accounts involved.
- Implement strict access controls on the EFI system partition to prevent unauthorized modifications.
- Regularly scan systems for signs of EFI-based rootkits or other malicious modifications.
Detection coverage 2
Detect EFI Volume Mount via Mountvol
highDetects attempts to mount the EFI volume using mountvol.exe
Detect EFI Volume Mount via Original Filename
highDetects attempts to mount the EFI volume by original filename
Detection queries are kept inside the platform. Get full rules →