Skip to content

T1059.010 AutoHotKey & AutoIT

Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to automate Windows tasks. These automation scripts can be used to perform a wide variety of actions, such as clicking on buttons, entering text, and opening and closing programs.21

Adversaries may use AHK (.ahk) and AutoIT (.au3) scripts to execute malicious code on a victim’s system. For example, adversaries have used for AHK to execute payloads and other modular malware such as keyloggers. Adversaries have also used custom AHK files containing embedded malware as Phishing payloads.3

These scripts may also be compiled into self-contained executable payloads (.exe).21

Item Value
ID T1059.010
Sub-techniques T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1059.009, T1059.010, T1059.011, T1059.012, T1059.013
Tactics TA0002
Platforms Windows
Version 1.1
Created 29 March 2024
Last Modified 15 April 2025

Procedure Examples

ID Name Description
G0087 APT39 APT39 has utilized AutoIt malware scripts embedded in Microsoft Office documents or malicious links.10
S1111 DarkGate DarkGate uses AutoIt scripts dropped to a hidden directory during initial installation phases, such as test.au3.9
S1213 Lumma Stealer Lumma Stealer has utilized AutoIt malware scripts and AutoIt executables.54
S0530 Melcoz Melcoz has been distributed through an AutoIt loader script.6
S1017 OutSteel OutSteel was developed using the AutoIT scripting language.8
S1207 XLoader XLoader can use an AutoIT script to decrypt a payload file, load it into victim memory, then execute it on the victim machine.7

Mitigations

ID Mitigation Description
M1038 Execution Prevention Use application control to prevent execution of AutoIt3.exe, AutoHotkey.exe, and other related features that may not be required for a given system or network to prevent potential misuse by adversaries.

References