Skip to content

M1038 Execution Prevention

Prevent the execution of unauthorized or malicious code on systems by implementing application control, script blocking, and other execution prevention mechanisms. This ensures that only trusted and authorized code is executed, reducing the risk of malware and unauthorized actions. This mitigation can be implemented through the following measures:

Application Control:

  • Use Case: Use tools like AppLocker or Windows Defender Application Control (WDAC) to create whitelists of authorized applications and block unauthorized ones. On Linux, use tools like SELinux or AppArmor to define mandatory access control policies for application execution.
  • Implementation: Allow only digitally signed or pre-approved applications to execute on servers and endpoints. (e.g., New-AppLockerPolicy -PolicyType Enforced -FilePath "C:\Policies\AppLocker.xml")

Script Blocking:

  • Use Case: Use script control mechanisms to block unauthorized execution of scripts, such as PowerShell or JavaScript. Web Browsers: Use browser extensions or settings to block JavaScript execution from untrusted sources.
  • Implementation: Configure PowerShell to enforce Constrained Language Mode for non-administrator users. (e.g., Set-ExecutionPolicy AllSigned)

Executable Blocking:

  • Use Case: Prevent execution of binaries from suspicious locations, such as %TEMP% or %APPDATA% directories.
  • Implementation: Block execution of .exe, .bat, or .ps1 files from user-writable directories.

Dynamic Analysis Prevention: - Use Case: Use behavior-based execution prevention tools to identify and block malicious activity in real time. - Implemenation: Employ EDR solutions that analyze runtime behavior and block suspicious code execution.

Item Value
ID M1038
Version 1.3
Created 11 June 2019
Last Modified 11 December 2024
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
enterprise T1548 Abuse Elevation Control Mechanism System settings can prevent applications from running that haven’t been downloaded from legitimate repositories which may help mitigate some of these issues. Not allowing unsigned applications from being run may also mitigate some risk.
enterprise T1548.004 Elevated Execution with Prompt System settings can prevent applications from running that haven’t been downloaded through the Apple Store which may help mitigate some of these issues. Not allowing unsigned applications from being run may also mitigate some risk.
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.004 Winlogon Helper DLL Identify and block potentially malicious software that may be executed through the Winlogon helper process by using application control 15 tools like AppLocker 5 6 that are capable of auditing and/or blocking unknown DLLs.
enterprise T1547.006 Kernel Modules and Extensions Application control and software restriction tools, such as SELinux, KSPP, grsecurity MODHARDEN, and Linux kernel tuning can aid in restricting kernel module loading.2627242325
enterprise T1547.009 Shortcut Modification Prevents malicious shortcuts or LNK files from executing unwanted code by ensuring only authorized applications and scripts are allowed to run.
enterprise T1059 Command and Scripting Interpreter Use application control where appropriate. For example, PowerShell Constrained Language mode can be used to restrict access to sensitive or otherwise dangerous language elements such as those used to execute arbitrary Windows APIs or files (e.g., Add-Type).12
enterprise T1059.001 PowerShell Use application control where appropriate. PowerShell Constrained Language mode can be used to restrict access to sensitive or otherwise dangerous language elements such as those used to execute arbitrary Windows APIs or files (e.g., Add-Type).12
enterprise T1059.002 AppleScript Use application control where appropriate.
enterprise T1059.003 Windows Command Shell Use application control where appropriate.
enterprise T1059.004 Unix Shell Use application control where appropriate. On ESXi hosts, the execInstalledOnly feature prevents binaries from being run unless they have been packaged and signed as part of a vSphere installation bundle (VIB).19
enterprise T1059.005 Visual Basic Use application control where appropriate. VBA macros obtained from the Internet, based on the file’s Mark of the Web (MOTW) attribute, may be blocked from executing in Office applications (ex: Access, Excel, PowerPoint, Visio, and Word) by default starting in Windows Version 2203.10
enterprise T1059.006 Python Denylist Python where not required.
enterprise T1059.007 JavaScript Denylist scripting where appropriate.
enterprise T1059.008 Network Device CLI TACACS+ can keep control over which commands administrators are permitted to use through the configuration of authentication and command authorization. 22
enterprise T1059.009 Cloud API Use application control where appropriate to block use of PowerShell CmdLets or other host based resources to access cloud API resources.
enterprise T1059.010 AutoHotKey & AutoIT Use application control to prevent execution of AutoIt3.exe, AutoHotkey.exe, and other related features that may not be required for a given system or network to prevent potential misuse by adversaries.
enterprise T1059.011 Lua Denylist Lua interpreters where appropriate.
enterprise T1059.013 Container CLI/API Deny scripting where appropriate. Tools such as Python or Go can utilize Kubernetes and Docker within a client library and execute commands within their application.
enterprise T1609 Container Administration Command Use read-only containers, read-only file systems, and minimal images when possible to prevent the execution of commands.14 Where possible, also consider using application control and software restriction tools (such as those provided by SELinux) to restrict access to files, processes, and system calls in containers.13
enterprise T1611 Escape to Host Use read-only containers, read-only file systems, and minimal images when possible to prevent the running of commands.14 Where possible, also consider using application control and software restriction tools (such as those provided by SELinux) to restrict access to files, processes, and system calls in containers.13
enterprise T1546 Event Triggered Execution -
enterprise T1546.002 Screensaver Block .scr files from being executed from non-standard locations.
enterprise T1546.006 LC_LOAD_DYLIB Addition Allow applications via known hashes.
enterprise T1546.008 Accessibility Features Adversaries can replace accessibility features binaries with alternate binaries to execute this technique. Identify and block potentially malicious software executed through accessibility features functionality by using application control 15 tools, like Windows Defender Application Control4, AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1546.009 AppCert DLLs Adversaries install new AppCertDLL binaries to execute this technique. Identify and block potentially malicious software executed through AppCertDLLs functionality by using application control 15 tools, like Windows Defender Application Control4, AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1546.010 AppInit DLLs Adversaries can install new AppInit DLLs binaries to execute this technique. Identify and block potentially malicious software executed through AppInit DLLs functionality by using application control 15 tools, like Windows Defender Application Control4, AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1068 Exploitation for Privilege Escalation Consider blocking the execution of known vulnerable drivers that adversaries may exploit to execute code in kernel mode. Validate driver block rules in audit mode to ensure stability prior to production deployment.28
enterprise T1564 Hide Artifacts -
enterprise T1564.003 Hidden Window Limit or restrict program execution using anti-virus software. On MacOS, allowlist programs that are allowed to have the plist tag. All other programs should be considered suspicious.
enterprise T1564.006 Run Virtual Instance Use application control to mitigate installation and use of unapproved virtualization software.
enterprise T1574 Hijack Execution Flow Adversaries may use new payloads to execute this technique. Identify and block potentially malicious software executed through hijacking by using application control solutions also capable of blocking libraries loaded by legitimate software.
enterprise T1574.001 DLL Identify and block potentially malicious software executed through DLL hijacking by using application control solutions capable of blocking DLLs loaded by legitimate software.11
enterprise T1574.006 Dynamic Linker Hijacking Adversaries may use new payloads to execute this technique. Identify and block potentially malicious software executed through hijacking by using application control solutions also capable of blocking libraries loaded by legitimate software.
enterprise T1574.007 Path Interception by PATH Environment Variable Adversaries will likely need to place new binaries in locations to be executed through this weakness. Identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate.345678
enterprise T1574.008 Path Interception by Search Order Hijacking Adversaries will likely need to place new binaries in locations to be executed through this weakness. Identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate.345678
enterprise T1574.009 Path Interception by Unquoted Path Adversaries will likely need to place new binaries in locations to be executed through this weakness. Identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate.345678
enterprise T1574.012 COR_PROFILER Identify and block potentially malicious unmanaged COR_PROFILER profiling DLLs by using application control solutions like AppLocker that are capable of auditing and/or blocking unapproved DLLs.1556
enterprise T1562 Impair Defenses Use application control where appropriate, especially regarding the execution of tools outside of the organization’s security policies (such as rootkit removal tools) that have been abused to impair system defenses. Ensure that only approved security applications are used and running on enterprise systems.
enterprise T1562.001 Disable or Modify Tools Use application control where appropriate, especially regarding the execution of tools outside of the organization’s security policies (such as rootkit removal tools) that have been abused to impair system defenses. Ensure that only approved security applications are used and running on enterprise systems.
enterprise T1562.011 Spoof Security Alerting Use application controls to mitigate installation and use of payloads that may be utilized to spoof security alerting.
enterprise T1490 Inhibit System Recovery Consider using application control configured to block execution of utilities such as diskshadow.exe that may not be required for a given system or network to prevent potential misuse by adversaries.
enterprise T1674 Input Injection Denylist scripting and use application control where appropriate. For example, PowerShell Constrained Language mode can be used to restrict access to sensitive or otherwise dangerous language elements such as those used to execute arbitrary Windows APIs or files (e.g., Add-Type).12
enterprise T1036 Masquerading Use tools that restrict program execution via application control by attributes other than file name for common operating system utilities that are needed.
enterprise T1036.005 Match Legitimate Resource Name or Location Use tools that restrict program execution via application control by attributes other than file name for common operating system utilities that are needed.
enterprise T1036.008 Masquerade File Type Ensure that input sanitization is performed and that files are validated properly before execution; furthermore, implement a strict allow list to ensure that only authorized file types are processed.21 Restrict and/or block execution of files where headers and extensions do not match.
enterprise T1106 Native API Identify and block potentially malicious software executed that may be executed through this technique by using application control 15 tools, like Windows Defender Application Control4, AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1219 Remote Access Tools Use application control to mitigate installation and use of unapproved software that can be used for remote access.
enterprise T1219.001 IDE Tunneling Use Group Policies to require user authentication by disabling anonymous tunnel access, preventing any unauthenticated tunnel creation or usage. Disable the Visual Studio Dev Tunnels feature to block tunnel-related commands, allowing only minimal exceptions for utility functions (unset, echo, ping, and user). Restrict tunnel access to approved Microsoft Entra tenant IDs by specifying allowed tenants; all other users are denied access by default.21
enterprise T1219.002 Remote Desktop Software Use application control to mitigate installation and use of unapproved software that can be used for remote access.
enterprise T1505 Server Software Component -
enterprise T1505.004 IIS Components Restrict unallowed ISAPI extensions and filters from running by specifying a list of ISAPI extensions and filters that can run on IIS.20
enterprise T1129 Shared Modules Identify and block potentially malicious software executed through this technique by using application control tools capable of preventing unknown modules from being loaded.
enterprise T1176 Software Extensions Set an extension allow or deny list as appropriate for your security policy.
enterprise T1176.001 Browser Extensions Set a browser extension allow or deny list as appropriate for your security policy.29
enterprise T1176.002 IDE Extensions Set an IDE extension allow or deny list as appropriate for your security policy.
enterprise T1553 Subvert Trust Controls System settings can prevent applications from running that haven’t been downloaded through the Apple Store (or other legitimate repositories) which can help mitigate some of these issues. Also enable application control solutions such as AppLocker and/or Device Guard to block the loading of malicious content.
enterprise T1553.001 Gatekeeper Bypass System settings can prevent applications from running that haven’t been downloaded through the Apple Store which can help mitigate some of these issues.
enterprise T1553.003 SIP and Trust Provider Hijacking Enable application control solutions such as AppLocker and/or Device Guard to block the loading of malicious SIP DLLs.
enterprise T1553.005 Mark-of-the-Web Bypass Consider blocking container file types at web and/or email gateways. Consider unregistering container file extensions in Windows File Explorer.30
enterprise T1218 System Binary Proxy Execution Consider using application control to prevent execution of binaries that are susceptible to abuse and not required for a given system or network.
enterprise T1218.001 Compiled HTML File Consider using application control to prevent execution of hh.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.002 Control Panel Identify and block potentially malicious and unknown .cpl files by using application control 15 tools, like Windows Defender Application Control4, AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1218.003 CMSTP Consider using application control configured to block execution of CMSTP.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.004 InstallUtil Use application control configured to block execution of InstallUtil.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.005 Mshta Use application control configured to block execution of mshta.exe if it is not required for a given system or network to prevent potential misuse by adversaries. For example, in Windows 10 and Windows Server 2016 and above, Windows Defender Application Control (WDAC) policy rules may be applied to block the mshta.exe application and to prevent abuse.9
enterprise T1218.008 Odbcconf Use application control configured to block execution of Odbcconf.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.009 Regsvcs/Regasm Block execution of Regsvcs.exe and Regasm.exe if they are not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.012 Verclsid Use application control configured to block execution of verclsid.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.013 Mavinject Use application control configured to block execution of mavinject.exe if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.014 MMC Use application control configured to block execution of MMC if it is not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1218.015 Electron Applications Where possible, enforce binary and application integrity with digital signature verification to prevent untrusted code from executing. For example, do not use shell.openExternal with untrusted content.
enterprise T1216 System Script Proxy Execution Certain signed scripts that can be used to execute other programs may not be necessary within a given environment. Use application control configured to block execution of these scripts if they are not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1216.001 PubPrn Certain signed scripts that can be used to execute other programs may not be necessary within a given environment. Use application control configured to block execution of these scripts if they are not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1216.002 SyncAppvPublishingServer Certain signed scripts that can be used to execute other programs may not be necessary within a given environment. Use application control configured to block execution of these scripts if they are not required for a given system or network to prevent potential misuse by adversaries.
enterprise T1080 Taint Shared Content Identify potentially malicious software that may be used to taint content or may result from it and audit and/or block the unknown programs by using application control 15 tools, like AppLocker, 5 6 or Software Restriction Policies 16 where appropriate. 17
enterprise T1127 Trusted Developer Utilities Proxy Execution Certain developer utilities should be blocked or restricted if not required.
enterprise T1127.001 MSBuild Use application control configured to block execution of msbuild.exe if it is not required for a given system or network to prevent potential misuse by adversaries. For example, in Windows 10 and Windows Server 2016 and above, Windows Defender Application Control (WDAC) policy rules may be applied to block the msbuild.exe application and to prevent abuse.9
enterprise T1127.003 JamPlus Consider blocking or restricting JamPlus if not required.
enterprise T1204 User Execution Application control may be able to prevent the running of executables masquerading as other files.
enterprise T1204.002 Malicious File Application control may be able to prevent the running of executables masquerading as other files.
enterprise T1204.004 Malicious Copy and Paste Use application control where appropriate. PowerShell Constrained Language mode can be used to restrict access to sensitive or otherwise dangerous language elements such as those used to execute arbitrary Windows APIs or files (e.g., Add-Type).12
enterprise T1047 Windows Management Instrumentation Use application control configured to block execution of wmic.exe if it is not required for a given system or network to prevent potential misuse by adversaries. For example, in Windows 10 and Windows Server 2016 and above, Windows Defender Application Control (WDAC) policy rules may be applied to block the wmic.exe application and to prevent abuse.9
enterprise T1220 XSL Script Processing If msxsl.exe is unnecessary, then block its execution to prevent abuse by adversaries.

References


  1. Carolina Uribe. (2024, May 28). Manage Dev Tunnels with Group Policies. Retrieved April 8, 2025. 

  2. Derek Bekoe, Carolina Uribe. (2023, March 28). Configure and deploy Group Policy Administrative Templates for Dev Tunnels. Retrieved March 24, 2025. 

  3. Beechey, J.. (2014, November 18). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014. 

  4. Gorzelany, A., Hall, J., Poggemeyer, L.. (2019, January 7). Windows Defender Application Control. Retrieved July 16, 2019. 

  5. Tomonaga, S. (2016, January 26). Windows Commands Abused by Attackers. Retrieved February 2, 2016. 

  6. NSA Information Assurance Directorate. (2014, August). Application Whitelisting Using Microsoft AppLocker. Retrieved March 31, 2016. 

  7. Corio, C., & Sayana, D. P.. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014. 

  8. Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016. 

  9. Coulter, D. et al.. (2019, April 9). Microsoft recommended block rules. Retrieved August 12, 2021. 

  10. Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022. 

  11. Microsoft. (2024, October 1). DLL rules in AppLocker. Retrieved April 10, 2025. 

  12. PowerShell Team. (2017, November 2). PowerShell Constrained Language Mode. Retrieved March 27, 2023. 

  13. Kubernetes. (n.d.). Configure a Security Context for a Pod or Container. Retrieved March 8, 2023. 

  14. National Security Agency, Cybersecurity and Infrastructure Security Agency. (2022, March). Kubernetes Hardening Guide. Retrieved April 1, 2022. 

  15. Beechey, J. (2010, December). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014. 

  16. Corio, C., & Sayana, D. P. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved September 12, 2024. 

  17. Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016. 

  18. CertiK. (2020, June 30). Vulnerability in Electron-based Application: Unintentionally Giving Malicious Code Room to Run. Retrieved March 7, 2024. 

  19. Alex Marvi, Greg Blaum, and Ron Craft. (2023, June 28). Detection, Containment, and Hardening Opportunities for Privileged Guest Operations, Anomalous Behavior, and VMCI Backdoors on Compromised VMware Hosts. Retrieved March 26, 2025. 

  20. Microsoft. (2016, September 26). ISAPI/CGI Restrictions . Retrieved June 3, 2021. 

  21. YesWeRHackers. (2021, June 16). File Upload Attacks (Part 2). Retrieved August 23, 2022. 

  22. Cisco. (n.d.). Cisco IOS Software Integrity Assurance - TACACS. Retrieved October 19, 2020. 

  23. Boelen, M. (2015, October 7). Increase kernel integrity with disabled Linux kernel modules loading. Retrieved June 4, 2020. 

  24. Kernel.org. (2020, February 6). Kernel Self-Protection. Retrieved June 4, 2020. 

  25. Pingios, A.. (2018, February 7). LKM loading kernel restrictions. Retrieved June 4, 2020. 

  26. Vander Stoep, J. (2016, April 5). [v3] selinux: restrict kernel module loadinglogin register. Retrieved April 9, 2018. 

  27. Wikibooks. (2018, August 19). Grsecurity/The RBAC System. Retrieved June 4, 2020. 

  28. Microsoft. (2020, October 15). Microsoft recommended driver block rules. Retrieved March 16, 2021. 

  29. Mohta, A. (n.d.). Block Chrome Extensions using Google Chrome Group Policy Settings. Retrieved January 10, 2018. 

  30. Dormann, W. (2019, September 4). The Dangers of VHD and VHDX Files. Retrieved March 16, 2021.