Skip to main content
T1204Executioneasy difficulty

User Execution

User Execution (T1204) is a MITRE ATT&CK technique in the Execution tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is User Execution?

An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of phishing. While User Execution frequently occurs shortly after initial access through phishing, it can also be triggered by drive-by compromise, malvertising, or watering hole attacks. Adversaries craft convincing lures such as fake invoices, shipping notifications, or security alerts that prompt users to enable macros, click links, or open attachments. The effectiveness of this technique relies heavily on the urgency or legitimacy of the social engineering pretext used to trick users into taking the desired action against their better judgment or security training.

User Execution is documented as technique T1204 in the MITRE ATT&CK knowledge base under the Execution tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify User Execution activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor Office application processes for macro execution events, particularly when macros access the internet, spawn child processes, or write executable files to disk locations commonly used for malware staging.

  2. 2

    Track file execution events for files downloaded from the internet or received via email, paying attention to the Zone.Identifier alternate data stream which indicates files sourced from external locations.

  3. 3

    Correlate user-initiated file execution with subsequent network connections, registry modifications, or process creation to identify execution chains consistent with malware deployment following social engineering.

  4. 4

    Alert on execution of files from temporary directories, user profile download folders, or uncommon paths such as AppData or Temp, which are frequently used as staging locations for malware delivered through user execution.

  5. 5

    Monitor for the extraction and execution of files from password-protected archives, as attackers use password protection to bypass email gateway scanning and deliver malicious executables to end users.

Example Alerts

These realistic alert examples show what User Execution looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

CriticalXDR

Malicious Office Macro Enabled by User

User enabled macros in a Word document received via email claiming to be an invoice from a vendor. Macro executed PowerShell to download and run a payload from hxxps://cdn-updates.net/update.exe. The executable was immediately flagged by behavioral analysis as exhibiting ransomware-like encryption behavior against user documents.

HighXDR

Executable File Run from Downloads Folder

User executed a file named AdobeFlashPlayer_Update.exe from the Downloads directory. The file has a Zone.Identifier mark indicating it was downloaded from the internet 8 minutes prior. Execution spawned cmd.exe and made DNS queries to three recently registered domains associated with the Agent Tesla keylogger family.

HighXDR

LNK File Execution Leading to Script Launch

Shortcut file execution triggered cmd.exe which invoked mshta.exe to retrieve and execute a remote HTA payload. The LNK file was delivered as an email attachment masquerading as a document preview. The HTA payload contains obfuscated VBScript that establishes persistence via a scheduled task and downloads additional tooling.

Practice Detecting User Execution

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including User Execution. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect User Execution?
SOC analysts detect User Execution (T1204) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor office application processes for macro execution events, particularly when macros access the internet, spawn child processes, or write executa. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect User Execution?
User Execution can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the execution phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is User Execution in real-world attacks?
User Execution is a well-documented MITRE ATT&CK technique in the Execution tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic User Execution scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting User Execution for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Execution techniques like User Execution. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is Alert Triage? — SOC Glossary

Alert triage is the structured process of reviewing, prioritizing, and investigating security alerts to determine their …

Read more
Glossary

What is TTPs? — SOC Glossary

Tactics, Techniques, and Procedures (TTPs) describe the behavioral patterns, methods, and operational processes threat a…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more
Playbook

Suspicious Process Execution Investigation — Investigation Playbook

When XDR or EDR alerts on suspicious process execution, unusual parent-child relationships, encoded command lines, or pr…

Read more

We use cookies to improve your experience and measure usage. Learn more