Safe Mode Boot (T1562.009)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021. Microsoft Safe Mode
Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021. Sophos Snatch Ransomware 2019
Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021. Microsoft bcdedit 2021
Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021. CyberArk Labs Safe Mode 2016
Cybereason Nocturnus. (2020, November 19). Cybereason vs. MedusaLocker Ransomware. Retrieved June 23, 2021. Cybereason Nocturnus MedusaLocker 2020
Abrams, L. (2021, March 19). REvil ransomware has a new ‘Windows Safe Mode’ encryption mode. Retrieved June 23, 2021. BleepingComputer REvil 2021
Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021. Microsoft Bootcfg