T1059.003 - Windows Command Shell
Sub-technique
Tattiche:
Execution
Execution
Piattaforme:
Windows
Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. The command prompt can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [SSH](https://attack.mitre.org/techniques/T1021/004).(Citation: SSH in Windows)
Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple systems.
Adversaries may leverage [cmd](https://attack.mitre.org/software/S0106) to execute various commands and payloads. Common uses include [cmd](https://attack.mitre.org/software/S0106) to execute a single command, or abusing [cmd](https://attack.mitre.org/software/S0106) interactively with input and output forwarded over a command and control channel.
Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple systems.
Adversaries may leverage [cmd](https://attack.mitre.org/software/S0106) to execute various commands and payloads. Common uses include [cmd](https://attack.mitre.org/software/S0106) to execute a single command, or abusing [cmd](https://attack.mitre.org/software/S0106) interactively with input and output forwarded over a command and control channel.
Usato da Attori (20)
APT1
Nation-state
Nation-state
APT3
Nation-state
Nation-state
DarkHotel
Nation-state
Nation-state
APT18
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
FIN6
Unknown
Unknown
OilRig
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
APT32
Nation-state
Nation-state
FIN8
Unknown
Unknown
APT5
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
Sowbug
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
Dark Caracal
Unknown
Unknown
APT37
Nation-state
Nation-state
RANCOR
Nation-state
Nation-state
Malware (20)
TrickBot other
PowerDuke other
BLINDINGCAN other
Pikabot other
Wiarp other
RCSession other
Spark other
Bumblebee other
MURKYTOP other
Exaramel for Windows other
Proxysvc other
Orz other
SEASHARPEE other
POWRUNER other
RobbinHood other
TDTESS other
SharpStage other
Sardonic other
Misdat other
adbupd other
Metadata
| MITRE ID: | T1059.003 |
| STIX ID: | attack-pattern--d1fcf083-a721-... |
| Piattaforme: | Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |