Scripting (T1064)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Scripting

Associated Tactics

  • Defense Evasion
  • Execution

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Metasploit. (n.d.). Retrieved December 4, 2014. Metasploit_Ref
Veil Framework. (n.d.). Retrieved December 4, 2014. Veil_Ref
PowerSploit. (n.d.). Retrieved December 4, 2014. Powersploit
Alperovitch, D. (2014, July 7). Deep in Thought: Chinese Targeting of National Security Think Tanks. Retrieved November 12, 2014. Alperovitch 2014
Felix. (2016, September). Analyzing Malicious Office Documents. Retrieved April 11, 2018. Uperesia Malicious Office Documents