Skip to content

Payload Execution

Info

ID: AT-007
Tactic: Execution
MITRE technique: TA0002

Payload Execution consists of techniques adversaries use to trigger execution of previously delivered malicious content within an application’s runtime. This includes exploiting insecure deserialization or template engines, abusing serverless function invocations, leveraging injection flaws (SQL, command, template), or scheduling jobs to run malicious code. Payload execution tactics transform planted artifacts into active compromise by leveraging legitimate application functionality to achieve code execution.

Mitigations

ID Mitigation Description
AM-M0007 Application Allowlisting Implement application allowlisting to control which executables are permitted to run on systems.
AM-M0038 Behavior Prevention on Endpoint Deploy endpoint detection and response (EDR) solutions to identify and block suspicious execution patterns.
AM-M0022 Execution Prevention Utilize software restriction policies and other execution prevention mechanisms to limit unauthorized code execution.
AM-M0039 Antivirus/Antimalware Deploy and maintain up-to-date antivirus and antimalware solutions to detect and prevent known malicious code execution.