Skip to content

Execution

The adversary is trying to run malicious code.

Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

In cloud environments, execution commonly involves invoking serverless functions (Lambda, Cloud Functions), running commands through instance metadata services, or leveraging cloud-native automation tools like SSM, CloudFormation, or Azure Automation. Adversaries may also abuse cloud shells and container orchestration platforms.

View Execution on MITRE ATT&CK →

AWS Invoke

Invokes a Lambda function synchronously or asynchronously, triggering its execution with an optional input payload.

Cloud Service: AWS - Lambda
Tactics:
Techniques: