At (T1053.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution
  • Persistence
  • Privilege Escalation

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021. rowland linux at 2019
Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021. GTFObins at
IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022. Linux at
Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved September 12, 2024. Twitter Leoloobeek Scheduled Task
Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019. Microsoft Scheduled Task Events Win10
Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017. TechNet Scheduled Task Events
Philip Tsukerman. (n.d.). No Win32 Process Needed | Expanding the WMI Lateral Movement Arsenal. Retrieved June 19, 2024. Malicious Life by Cybereason
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns
Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017. TechNet Forum Scheduled Task Operational Setting