Esc
Object Eviction
Definition
Terminate or remove an object from a host machine. This is the broadest class for object eviction.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 9 techniques in this category, Object Eviction.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Object Eviction | D3-OE | Terminate or remove an object from a host machine. This is the broadest class for object eviction. | |
| - File Eviction | D3-FEV | File eviction techniques delete files from system storage. | |
| - Disk Partitioning | D3-DKP | Disk Partitioning is the process of dividing a disk into multiple distinct sections, known as partitions. | |
| - Domain Registration Takedown | D3-DRT | The process of performing a takedown of the attacker's domain registration infrastructure. | |
| - DNS Cache Eviction | D3-DNSCE | Flushing DNS to clear any IP addresses or other DNS records from the cache. | Flush DNS Cache |
| - Disk Formatting | D3-DKF | Disk Formatting is the process of preparing a data storage device, such as a hard drive, solid-state drive, or USB flash drive, for initial use. | |
| - Disk Erasure | D3-DKE | Disk Erasure is the process of securely deleting all data on a disk to ensure that it cannot be recovered by any means. | |
| - Registry Key Deletion | D3-RKD | Delete a registry key. | |
| - Email Removal | D3-ER | The email removal technique deletes email files from system storage. | Email Deletion |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Lateral Movement
Software Deployment Tools
Internal Spearphishing
Privilege Escalation
Abuse Elevation Control Mechanism
Process Injection
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Create or Modify System Process
Scheduled Task/Job
Boot or Logon Initialization Scripts
Command And Control
Encrypted Channel
Application Layer Protocol
Impact
Data Encrypted for Impact
Data Manipulation
Disk Wipe
Collection
Automated Collection
Data Staged
Archive Collected Data
Data from Local System
Email Collection
Discovery
System Network Configuration Discovery
Remote System Discovery
System Owner/User Discovery
File and Directory Discovery
Cloud Storage Object Discovery
Persistence
Office Application Startup
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Server Software Component
Modify Authentication Process
Create or Modify System Process
Scheduled Task/Job
Boot or Logon Initialization Scripts
Execution
Software Deployment Tools
User Execution
Command and Scripting Interpreter
Scheduled Task/Job
Credential Access
Unsecured Credentials
Modify Authentication Process
OS Credential Dumping
Forced Authentication
Credentials from Password Stores
Steal or Forge Authentication Certificates
Defense Evasion
Abuse Elevation Control Mechanism
Indicator Removal
Masquerading
Process Injection
System Binary Proxy Execution
Obfuscated Files or Information
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Hijack Execution Flow
Deobfuscate/Decode Files or Information
Modify Authentication Process
Rootkit
Impair Defenses
XSL Script Processing
Exfiltration
Exfiltration Over C2 Channel
Exfiltration Over Alternative Protocol