T1059.010 - AutoHotKey & AutoIT

Sub-technique
Tattiche:
Execution
Piattaforme:
Windows
Rilevamento:
Not specified
Description:
Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to automate Windows tasks. These automation scripts can be used to perform a wide variety of actions, such as clicking on buttons, entering text, and opening and closing programs.(Citation: AutoIT)(Citation: AutoHotKey)

Adversaries may use AHK (`.ahk`) and AutoIT (`.au3`) scripts to execute malicious code on a victim's system. For example, adversaries have used for AHK to execute payloads and other modular malware such as keyloggers. Adversaries have also used custom AHK files containing embedded malware as [Phishing](https://attack.mitre.org/techniques/T1566) payloads.(Citation: Splunk DarkGate)

These scripts may also be compiled into self-contained executable payloads (`.exe`).(Citation: AutoIT)(Citation: AutoHotKey)
Usato da Attori (1)
Metadata
MITRE ID: T1059.010
STIX ID: attack-pattern--3a32740a-11b0-...
Piattaforme: Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00