Skip to content

Hide Navigation Hide TOC

Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463)

Restrict execution of code to a virtual environment on or in transit to an endpoint system.

Cluster A Galaxy A Cluster B Galaxy B Level
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action HTML Smuggling - T1027.006 (d4dc46e3-5ba5-45b9-8204-010867cacfcb) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploitation for Credential Access - T1212 (9c306d8d-cde7-4b4c-b6e8-d0bb16caca36) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Distributed Component Object Model - T1021.003 (68a0c5ed-bee2-4513-830d-5b0d650139bd) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploitation for Defense Evasion - T1211 (fe926152-f431-4baf-956c-4ad3cb0bf23b) Attack Pattern 1
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Drive-by Compromise - T1189 (d742a578-d70e-4d0e-96a6-02a9c30204e6) Attack Pattern 1
Component Object Model - T1559.001 (2f6b4ed7-fef1-44ba-bcb8-1b4beb610b64) Attack Pattern Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Dynamic Data Exchange - T1559.002 (232a7e42-cd6e-4902-8fe9-2960f529dd4d) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Escape to Host - T1611 (4a5b7ade-8bb5-4853-84ed-23f262002665) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Exploitation of Remote Services - T1210 (9db0cf3a-a3c9-4012-8268-123b9db6fd82) Attack Pattern 1
Application Isolation and Sandboxing - M1048 (b9f0c069-abbe-4a07-a245-2481219a1463) Course of Action Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern 1
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern HTML Smuggling - T1027.006 (d4dc46e3-5ba5-45b9-8204-010867cacfcb) Attack Pattern 2
Remote Services - T1021 (54a649ff-439a-41a4-9856-8d144a2551ba) Attack Pattern Distributed Component Object Model - T1021.003 (68a0c5ed-bee2-4513-830d-5b0d650139bd) Attack Pattern 2
Component Object Model - T1559.001 (2f6b4ed7-fef1-44ba-bcb8-1b4beb610b64) Attack Pattern Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern 2
Dynamic Data Exchange - T1559.002 (232a7e42-cd6e-4902-8fe9-2960f529dd4d) Attack Pattern Inter-Process Communication - T1559 (acd0ba37-7ba9-4cc5-ac61-796586cd856d) Attack Pattern 2