JavaScript (T1059.007)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Apple. (2016, June 13). About Mac Scripting. Retrieved April 14, 2021. Apple About Mac Scripting 2016
Dominic Chell. (2021, January 1). macOS Post-Exploitation Shenanigans with VSCode Extensions. Retrieved April 20, 2021. MDSec macOS JXA and VSCode
Microsoft. (2007, August 15). The World of JScript, JavaScript, ECMAScript …. Retrieved June 23, 2020. Microsoft JScript 2007
Microsoft. (2017, January 18). Windows Script Interfaces. Retrieved June 23, 2020. Microsoft Windows Scripts
Microsoft. (2018, May 31). Translating to JScript. Retrieved June 23, 2020. JScrip May 2018
OpenJS Foundation. (n.d.). Node.js. Retrieved June 23, 2020. NodeJS
Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020. SentinelOne macOS Red Team
Pitt, L. (2020, August 6). Persistent JXA. Retrieved April 14, 2021. SpecterOps JXA 2020
Tony Lambert. (2021, February 18). Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight. Retrieved April 20, 2021. Red Canary Silver Sparrow Feb2021