MITRE ATT&CK / T1204.002
T1204.002
Malicious File
Description
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, .cpl, .reg, and .iso.(Citation: Mandiant Trojanized Windows 10)Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).
Platforms
Mitigations
- M1038 — Execution Prevention
- M1040 — Behavior Prevention on Endpoint
- M1017 — User Training
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- JDownloader Site Hacked, Installers Swapped with Python RAT Malware
- TrustFall: AI Coding Agents Exploitable with One Enter Keypress
- Quasar Linux (QLNX): Rootkit and PAM Backdoor Targeting Developer Credentials
- North Korea Cryptocurrency Theft Tactics 2026: How DPRK Seized 76% of All Stolen Crypto
- WhatsApp Patches CVE-2026-23863 File Spoofing and CVE-2026-23866 URL Scheme Flaw
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →