T1059.007 JavaScript/JScript Mappings

Adversaries may abuse JavaScript and/or JScript for execution. JavaScript (JS) is a platform-agnostic scripting language (compiled just-in-time at runtime) commonly associated with scripts in webpages, though JS can be executed in runtime environments outside the browser.(Citation: NodeJS)

JScript is the Microsoft implementation of the same scripting standard. JScript is interpreted via the Windows Script engine and thus integrated with many components of Windows such as the Component Object Model and Internet Explorer HTML Application (HTA) pages.(Citation: JScrip May 2018)(Citation: Microsoft JScript 2007)(Citation: Microsoft Windows Scripts)

Adversaries may abuse JavaScript / JScript to execute various behaviors. Common uses include hosting malicious scripts on websites as part of a Drive-by Compromise or downloading and executing these script files as secondary payloads. Since these payloads are text-based, it is also very common for adversaries to obfuscate their content as part of Obfuscated Files or Information.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
CM-2 Baseline Configuration Protects T1059.007 JavaScript/JScript
CM-6 Configuration Settings Protects T1059.007 JavaScript/JScript
CM-7 Least Functionality Protects T1059.007 JavaScript/JScript
CM-8 System Component Inventory Protects T1059.007 JavaScript/JScript
RA-5 Vulnerability Monitoring and Scanning Protects T1059.007 JavaScript/JScript
SC-18 Mobile Code Protects T1059.007 JavaScript/JScript
SI-10 Information Input Validation Protects T1059.007 JavaScript/JScript
SI-3 Malicious Code Protection Protects T1059.007 JavaScript/JScript
SI-4 System Monitoring Protects T1059.007 JavaScript/JScript
SI-7 Software, Firmware, and Information Integrity Protects T1059.007 JavaScript/JScript
azure_sentinel Azure Sentinel technique_scores T1059.007 JavaScript/JScript