T1204.002 - Malicious File
Sub-technique
Tactics:
Execution
Execution
Platforms:
Linux macOS Windows
Linux macOS Windows
Detection:
Not specified
Not specified
Description:
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, .cpl, .reg, and .iso.(Citation: Mandiant Trojanized Windows 10)
Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)
While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).
Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)
While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).
Used by Actors (20)
DarkHotel
Nation-state
Nation-state
APT12
Nation-state
Nation-state
APT19
Nation-state
Nation-state
Naikon
Nation-state
Nation-state
APT30
Nation-state
Nation-state
APT33
Nation-state
Nation-state
APT28
Nation-state
Nation-state
APT29
Nation-state
Nation-state
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
FIN6
Unknown
Unknown
OilRig
Nation-state
Nation-state
Molerats
Nation-state
Nation-state
PROMETHIUM
Unknown
Unknown
Gamaredon Group
Unknown
Unknown
APT32
Nation-state
Nation-state
PLATINUM
Unknown
Unknown
FIN8
Unknown
Unknown
TA459
Unknown
Unknown
Tonto Team
Nation-state
Nation-state
Malware (20)
TrickBot other
BLINDINGCAN other
Ninja other
Bumblebee other
KOPILUWAK other
ThreatNeedle other
StrongPity other
Pony other
AppleSeed other
NETWIRE other
Bad Rabbit other
EnvyScout other
STATICPLUGIN other
Emotet other
Woody RAT other
Squirrelwaffle other
Snip3 other
Rifdoor other
GuLoader other
InvisiMole other
Metadata
| MITRE ID: | T1204.002 |
| STIX ID: | attack-pattern--232b7f21-adf9-... |
| Platforms: | Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |