AppleScript (T1059.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Apple. (2016, January 25). Introduction to AppleScript Language Guide. Retrieved March 28, 2020. Apple AppleScript
Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020. SentinelOne macOS Red Team
Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020. SentinelOne AppleScript
Yerko Grbic. (2017, February 14). Macro Malware Targets Macs. Retrieved July 8, 2017. Macro Malware Targets Macs