TA0002 Execution

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1047 Windows Management Instrumentation 27 0
T1129 Shared Modules 8 0
T1053 Scheduled Task/Job 29 5
T1106 Native API 9 0
T1610 Deploy Container 26 0
T1059 Command and Scripting Interpreter 45 11
T1609 Container Administration Command 28 0
T1204 User Execution 32 3
T1072 Software Deployment Tools 51 0
T1559 Inter-Process Communication 30 3
T1203 Exploitation for Client Execution 41 0
T1569 System Services 22 2
T1651 Cloud Administration Command 18 0
T1648 Serverless Execution 14 0