AutoHotKey & AutoIT (T1059.010)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
AutoHotkey Foundation LLC. (n.d.). Using the Program. Retrieved March 29, 2024. AutoHotKey
AutoIT. (n.d.). Running Scripts. Retrieved March 29, 2024. AutoIT
Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024. Splunk DarkGate