Skip to content

DC0004 Firmware Modification

Item Value
ID DC0004
Version 2.0
Created 20 October 2021
Last Modified 21 October 2025

Log Sources

Name Channel
auditd:SYSCALL write access to /dev/mem or /sys/firmware/efi/efivars
auditd:SYSCALL ioctl/write: Direct firmware update or device memory manipulation syscalls
etw:Microsoft-Windows-Kernel-Storage Raw disk I/O operations bypassing NTFS APIs
Firmware None
firmware:integrity Baseline mismatch or unexpected EFI module detected during integrity checks
firmware:integrity Firmware integrity verification failures or mismatches against expected UEFI/firmware image baselines
firmware:runtime Debug or memory access commands indicating attempts to alter OS instructions in memory
firmware:smart Unexpected firmware-level errors or abnormal S.M.A.R.T. log entries
macos:osquery Unexpected changes in EFI or NVRAM variables controlling hardware boot state
macos:unifiedlog boot failure events or SMC validation errors
macos:unifiedlog Firmware update events or kernel extension (kext) loads not signed by Apple
networkdevice:config Boot image path or firmware configuration variable modified outside of maintenance windows
networkdevice:config Log entries indicating ROMMON image upgrade commands (boot system, upgrade rom-monitor)
networkdevice:config Boot variable modified to point to non-standard or unsigned image
networkdevice:firmware Firmware update initiated or bootloader tampering detected
networkdevice:syslog Image Upgrade / Configuration Change
networkdevice:syslog Custom firmware or routing changes
networkdevice:syslog Boot information log showing image loaded from TFTP server instead of local storage
WinEventLog:Microsoft-Windows-Kernel-Boot Firmware integrity validation failed or boot configuration tampered

Detection Strategy

ID Name Technique Detected
DET0089 Behavioral Detection of Keylogging Activity Across Platforms T1056.001
DET0790 Detection of Module Firmware T0839
DET0780 Detection of Rootkit T0851
DET0731 Detection of System Firmware T0857
DET0461 Detection Strategy for Hidden File System Abuse T1564.005
DET0469 Detection Strategy for Patch System Image on Network Devices T1601.001
DET0278 Detection Strategy for T1542 Pre-OS Boot T1542
DET0099 Detection Strategy for T1542.001 Pre-OS Boot: System Firmware T1542.001
DET0323 Detection Strategy for T1542.002 Pre-OS Boot: Component Firmware T1542.002
DET0175 Detection Strategy for T1542.004 Pre-OS Boot: ROMMONkit T1542.004
DET0582 Detection Strategy for T1542.005 Pre-OS Boot: TFTP Boot T1542.005
DET0167 Firmware Modification via Flash Tool or Corrupted Firmware Upload T1495
DET0359 Multi-hop Proxy Behavior via Relay Node Chaining, Onion Routing, and Network Tunneling T1090.003