T1204.002 Malicious File

An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Attachment. Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, .cpl, and .reg.

Adversaries may employ various forms of Masquerading and Obfuscated Files or Information to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)

While Malicious File frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after Internal Spearphishing.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.AE-02.01 Event analysis and detection Mitigates T1204.002 Malicious File
Comments
This diagnostic statement provides for implementation of methods to block similar future attacks via security tools such as antivirus and IDS/IPS to provide protection against threats and exploitation attempts.
References
    PR.PS-05.03 Email and message service protection Mitigates T1204.002 Malicious File
    Comments
    Tools that detect and block and remove malware provide protection from users deceived into opening malicious attachments or files that can be found in emails (spearphishing).
    References
      DE.CM-01.05 Website and service blocking Mitigates T1204.002 Malicious File
      Comments
      This diagnostic statement protects user execution through the implementation of tools and measures to block unknown or unused files in transit.
      References

        NIST 800-53 Mappings

        Known Exploited Vulnerabilities Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        CVE-2023-21608 Adobe Acrobat and Reader Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having a user open a maliciously-crafted pdf file, which can result in arbitrary code execution.
        References
        CVE-2021-28550 Adobe Acrobat and Reader Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This exploit requires a user to open a malicious file. It can then result in execution of arbitrary code which could have any number of impacts.
        References
        CVE-2018-4878 Adobe Flash Player Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        The exploitation technique for this vulnerability is based on a vulnerability in Client software. In the wild, this was seen to be exploited by a malicious excel file. The observed goals of this exploit from Group 123 are remote access and data exfiltration.
        References
        CVE-2018-15982 Adobe Flash Player Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via a maliciously-crafted Word document, which then extracts the adversary's RAT tool.
        References
        CVE-2016-0984 Adobe Flash Player and AIR Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This use-after-free vulnerability is exploited by having the user open a maliciously-crafted file. This CVE was observed to be exploited by the threat actor known as BlackOasis.
        References
        CVE-2014-0496 Adobe Reader and Acrobat Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via a maliciously-crafted file.
        References
        CVE-2009-4324 Adobe Acrobat and Reader Use-After-Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having the user open a maliciously-crafted pdf file. In the wild, this has been observed to result in a malicious actor installing a custom executable on the victim's machine, and establishing communications.
        References
        CVE-2017-11292 Adobe Flash Player Type Confusion Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited using a malicious-crafted word document attached to spearphishing emails. Adversaries have been seen to leverage this to install exploit code from their command & control server. This malware then performs data collection on the target systems.
        References
        CVE-2023-21715 Microsoft Office Publisher Security Feature Bypass Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        CVE-2023-21715 is a security feature bypass vulnerability exploitable when a user opens a specially-crafted file bypassing macro policies.
        References
        CVE-2024-38080 Microsoft Windows Hyper-V Privilege Escalation Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This zero-day vulnerability presents itself after an adversary has already infiltrated the victim's network and enables the adversary to obtain SYSTEM level privileges via Microsoft Windows Hyper-V product. As of now, details of how the attacker's methods to exploit this vulnerability are undisclosed.
        References
        CVE-2018-4990 Adobe Acrobat and Reader Double Free Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via embedded javascript within a user-executed malicious pdf. There are two mapped exploitation_technqiues for this CVE.
        References
        CVE-2009-1862 Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited through a user opening a maliciously-crafted pdf file or swf file.
        References
        CVE-2008-0655 Adobe Acrobat and Reader Unspecified Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having a user open a maliciously-crafted pdf file.
        References
        CVE-2015-3043 Adobe Flash Player Memory Corruption Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by a maliciously-crafted .swf file which can be run on a user system.
        References
        CVE-2012-0754 Adobe Flash Player Memory Corruption Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via a maliciously-crafted MP4 file. As a result of the exploit, malicious software is installed on the target machine.
        References
        CVE-2010-1297 Adobe Flash Player Memory Corruption Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by crafted swf content via drive-by compromise when a user visits a malicious website. This vulnerability is also exploited via user execution of a maliciously crafted pdf file. In the wild, threat actors have used this to download malicious software onto the target system.
        References
        CVE-2011-2462 Adobe Acrobat and Reader Universal 3D Memory Corruption Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having the user open a malicious pdf file to achieve arbitrary code execution.
        References
        CVE-2021-21017 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This exploit requires a user to open a malicious file. It can then result in execution of arbitrary code which could have any number of impacts.
        References
        CVE-2015-3113 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system. The command and control functionality has also been seen to employ debugging/sandboxing evasion.
        References
        CVE-2013-0641 Adobe Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration.
        References
        CVE-2010-2883 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution.
        References
        CVE-2007-5659 Adobe Acrobat and Reader Buffer Overflow Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via a malicious PDF file in order to execute arbitrary code.
        References
        CVE-2023-36884 Microsoft Windows Search Remote Code Execution Vulnerability primary_impact T1204.002 Malicious File
        Comments
        This remote code execution vulnerability in Microsoft Office has been exploited by adversarial groups to distribute ransomware. Attackers use specially crafted Microsoft Office documents to bypass security features, enabling remote code execution without user prompts. These documents are typically delivered through phishing techniques, enticing victims to open them. Once opened, the ransomware encrypts files and demands a ransom for decryption, while also removing system backups and leaving a ransom note threatening data loss if recovery is attempted without the provided decryptor key. The ransomware further erases system logs and may publish stolen data on leak websites, leading to unauthorized access to sensitive information and potential installation of backdoors for further exploitation. Microsoft addressed this vulnerability in their security updates by introducing measures to make file paths unpredictable, thereby mitigating the exploit chain. Despite these updates, additional vulnerabilities in Microsoft Office and Windows were identified. Security solutions offer protection against these exploits, and findings are shared with cybersecurity alliances to enhance collective defense efforts. This vulnerability has been exploited by the Russian group Storm-0978, also known as RomCom, who craft specially designed Microsoft Office documents related to the Ukrainian World Congress. These documents bypass Microsoft's Mark-of-the-Web (MotW) security feature, enabling remote code execution without security prompts. The adversary used phishing techniques to deliver these documents, enticing victims to open them. Once opened, the ransomware, known as Underground, executes, encrypting files and demanding a ransom for decryption. The ransomware further removes shadow copies, terminates MS SQL Server services, and leaves a ransom note threatening data loss if recovery is attempted without their decryptor key. It also erases Windows Event logs and publishes stolen victim data on a data leak website, causing unauthorized access to sensitive information and potential installation of backdoors for further exploitation.
        References
        CVE-2022-34713 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability primary_impact T1204.002 Malicious File
        Comments
        This vulnerability is exploited when a user is tricked by an adversary to open a maliciously crafted file either via an email or malicious website. Once the user opens the file, an adversary gains the ability to execute arbitrary code the next time the victim restarts their computer and logs in.
        References
        CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploit through a maliciously crafted Word document, which downloads html that then runs commands on the target machine and has been seen to download additional payloads on target machines.
        References
        CVE-2016-4117 Adobe Flash Player Arbitrary Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        The vulnerability is exploited by a user opening a maliciously-crafted file. Reporting on in-the-wild exploitation indicates threat actor utilize this vulnerability to install command and control software on the target system. Adversaries seen exploiting this vulnerability were also observed to do a version check on the target software before attempting the exploitation.
        References
        CVE-2015-7645 Adobe Flash Player Arbitrary Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by the user opening a maliciously-crafted .swf file.
        References
        CVE-2012-1535 Adobe Flash Player Arbitrary Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having a user execute a maliciously-crafted word document that has embedded swf. The embedded swf can download additional malicious software from the web.
        References
        CVE-2011-0611 Adobe Flash Player Remote Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having a user execute a maliciously-crafted word document or pdf file that has embedded swf. The malicious code then downloads another payload to the target machine.
        References
        CVE-2009-3953 Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited by having a user open a maliciously-crafted pdf file.
        References
        CVE-2008-2992 Adobe Reader and Acrobat Input Validation Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        This vulnerability is exploited via a maliciously-crafted pdf file.
        References
        CVE-2023-26369 Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability exploitation_technique T1204.002 Malicious File
        CVE-2025-27363 FreeType Out-of-Bounds Write Vulnerability exploitation_technique T1204.002 Malicious File
        Comments
        Out of bounds write exists in FreeType that has been exploited through malicious font files, causing the application to crash.
        References

        VERIS Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        action.malware.variety.Other Other related-to T1204.002 Malicious File

        Azure Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        alerts_for_windows_machines Alerts for Windows Machines technique_scores T1204.002 Malicious File
        Comments
        This control may detect the usage of a malware dropper and other indicators of a malicious file being executed by the user. The following alerts may be generated: "Detected possible execution of keygen executable", "Detected possible execution of malware dropper", "Detected suspicious file creation".
        References
        microsoft_antimalware_for_azure Microsoft Antimalware for Azure technique_scores T1204.002 Malicious File
        Comments
        This control monitors activity in cloud services and on virtual machines to detect malware execution. This is dependent on a signature being available.
        References
        microsoft_antimalware_for_azure Microsoft Antimalware for Azure technique_scores T1204.002 Malicious File
        Comments
        This control monitors activity in cloud services and on virtual machines to block malware execution. This is dependent on a signature being available.
        References

        GCP Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        cloud_ids Cloud IDS technique_scores T1204.002 Malicious File
        Comments
        Often used by adversaries to establish persistence, Palo Alto Network's antivirus signatures is able to detect malware found in portable document formats (PDF). Although there are ways an attacker could modify the signature and deliver a malicious file, this technique was scored as significant based on Palo Alto Network's advanced threat detection technology which constantly updates to detect against the latest known variations of these attacks.
        References

        M365 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        DEF-SSCO-E3 Secure Score Technique Scores T1204.002 Malicious File
        Comments
        Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at Microsoft Secure Score in the Microsoft Defender portal. Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices. Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action. To help you find the information you need more quickly, Microsoft recommended actions are organized into groups: Identity (Microsoft Entra accounts & roles) Device (Microsoft Defender for Endpoint, known as Microsoft Secure Score for Devices) Apps (email and cloud apps, including Office 365 and Microsoft Defender for Cloud Apps) Data (through Microsoft Information Protection)
        References
        EOP-AMW-E3 Antimalware Technique Scores T1204.002 Malicious File
        Comments
        In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against malware by EOP. Some of the major categories of malware are: Viruses that infect other programs and data, and spread through your computer or network looking for programs to infect. Spyware that gathers your personal information, such as sign-in information and personal data, and sends it back to its author. Ransomware that encrypts your data and demands payment to decrypt it. Anti-malware software doesn't help you decrypt encrypted files, but it can detect the malware payload that's associated with the ransomware. EOP offers multi-layered malware protection that's designed to catch all known malware in Windows, Linux, and Mac that travels into or out of your organization. The following options help provide anti-malware protection: Layered defenses against malware: Multiple anti-malware scan engines help protect against both known and unknown threats. These engines include powerful heuristic detection to provide protection even during the early stages of a malware outbreak. This multi-engine approach has been shown to provide significantly more protection than using just one anti-malware engine. Real-time threat response: During some outbreaks, the anti-malware team might have enough information about a virus or other form of malware to write sophisticated policy rules that detect the threat, even before a definition is available from any of the scan engines used by the service. These rules are published to the global network every 2 hours to provide your organization with an extra layer of protection against attacks. Fast anti-malware definition deployment: The anti-malware team maintains close relationships with partners who develop anti-malware engines. As a result, the service can receive and integrate malware definitions and patches before they're publicly released. Our connection with these partners often allows us to develop our own remedies as well. The service checks for updated definitions for all anti-malware engines every hour. License Requirements: M365 E3 or Microsoft Defender for Office plan 1.
        References
        DEF-QUAR-E3 Quarantine Policies Technique Scores T1204.002 Malicious File
        Comments
        In Exchange Online Protection (EOP) and Microsoft Defender for Office 365, quarantine policies allow admins to define the user experience for quarantined messages. Traditionally, users have been allowed or denied levels of interactivity with quarantine messages based on why the message was quarantined. For example, users can view and release messages that were quarantined as spam or bulk, but they can't view or release messages that were quarantined as high confidence phishing or malware. The following M365 features are supported by quarantine policies, “Response” to Anti-malware and Anti-Phishing tagged items. Files that are quarantined as malware by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. License requirements: M365 E3 (or Defender for Office plan 1)
        References
        DEF-ZHAP-E3 Zero Hour Auto Purge Technique Scores T1204.002 Malicious File
        Comments
        Zero-hour auto purge (ZAP) is a protection feature in Exchange Online Protection (EOP) that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes. With the E5 licensing or Office Plan 2, ZAP is also able to retroactively detect existing malicious chat messages in Microsoft Teams that are identified as malware or high confidence phishing. License Requirements: ZAP for Defender O365 is included with M365's E3 and requires E5 when leveraging ZAP for Teams security.
        References
        DEF-AACI-E3 Adaptive Application Control Integration Technique Scores T1204.002 Malicious File
        Comments
        Once this control is activated, it generates alerts for any executable that has been run and is not included in an allow list. There is a significant potential for false positives from new non-malicious executables, and events are calculated once every twelve hours, so its temporal score is Partial.
        References
        DEF-AACI-E3 Adaptive Application Control Integration Technique Scores T1204.002 Malicious File
        Comments
        Once this control is activated, it generates alerts for any executable that has been run and is not included in an allow list. There is a significant potential for false positives from new non-malicious executables, and events are calculated once every twelve hours, so its temporal score is Partial.
        References
        DEF-SATT-E3 Safe Attachments Technique Scores T1204.002 Malicious File
        Comments
        M365's Safe Attachments is a feature that provides advanced email security by scanning attachments for malicious content and using a virtual environment to check for malicious actions in a process known as detonation. Safe Attachments for SharePoint, OneDrive, and Microsoft Teams operates in real-time to detect against emerging threats. If a suspicious file is identified, this file can be quarantined or blocked access to prevent potential harm. License requirements: Mirosoft 365 E5, Defender for Office Plan 1, Microsoft 365 E3 with ATP add-on
        References
        DEF-SATT-E3 Safe Attachments Technique Scores T1204.002 Malicious File
        Comments
        M365's Safe Attachments is a feature that provides advanced email security by scanning attachments for malicious content and using a virtual environment to check for malicious actions in a process known as detonation. Safe Attachments for SharePoint, OneDrive, and Microsoft Teams operates in real-time to detect against emerging threats. If a suspicious file is identified, this file can be quarantined or blocked access to prevent potential harm. License requirements: Mirosoft 365 E5, Defender for Office Plan 1, Microsoft 365 E3 with ATP add-on
        References
        DEF-AIR-E5 Automated Investigation and Response Technique Scores T1204.002 Malicious File
        Comments
        Microsoft Defender for Office 365 includes powerful automated investigation and response (AIR) capabilities that can save your security operations team time and effort. As alerts are triggered, it's up to your security operations team to review, prioritize, and respond to those alerts. Keeping up with the volume of incoming alerts can be overwhelming. Automating some of those tasks can help. AIR enables your security operations team to operate more efficiently and effectively. AIR capabilities include automated investigation processes in response to well-known threats that exist today. Appropriate remediation actions await approval, enabling your security operations team to respond effectively to detected threats. With AIR, your security operations team can focus on higher-priority tasks without losing sight of important alerts that are triggered. Examples include: Soft delete email messages or clusters, Block URL (time-of-click), Turn off external mail forwarding, Turn off delegation, etc. Required licenses E5 or Microsoft Defender for Office 365 Plan 2 licenses.
        References
        DEF-SIMT-E5 ATT&CK Simulation Training Technique Scores T1204.002 Malicious File
        Comments
        M365's Defender Attack Simulation Training allows organizations to automate the simulation of benign real-world cyberattacks. These simulation automations feature social engineering techniques, payloads, and can start on an automated schedule. This detection focused security control partially improves organizations security posture by continuously conduct attack simulations that fine tune analytics, and provide hands-on training for users and cyber professionals to improve response capabilities. The following social engineering techniques are available: Credential Harvest: Attempts to collect credentials by taking users to a well-known looking website with input boxes to submit a username and password. Malware Attachment: Adds a malicious attachment to a message. When the user opens the attachment, arbitrary code is run that helps the attacker compromise the target's device. Link in Attachment: A type of credential harvest hybrid. An attacker inserts a URL into an email attachment. The URL within the attachment follows the same technique as credential harvest. Link to Malware: Runs some arbitrary code from a file hosted on a well-known file sharing service. The message sent to the user contains a link to this malicious file, opening the file and helping the attacker compromise the target's device. Drive-by URL: The malicious URL in the message takes the user to a familiar-looking website that silently runs and/or installs code on the user's device. OAuth Consent Grant: The malicious URL asks users to grant permissions to data for a malicious Azure Application. License Requirements: Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2.
        References
        DEF-SIMT-E5 ATT&CK Simulation Training Technique Scores T1204.002 Malicious File
        Comments
        M365's Defender Attack Simulation Training allows organizations to automate the simulation of benign real-world cyberattacks. These simulation automations feature social engineering techniques, payloads, and can start on an automated schedule. This detection focused security control partially improves organizations security posture by continuously conduct attack simulations that fine tune analytics, and provide hands-on training for users and cyber professionals to improve response capabilities. The following social engineering techniques are available: Credential Harvest: Attempts to collect credentials by taking users to a well-known looking website with input boxes to submit a username and password. Malware Attachment: Adds a malicious attachment to a message. When the user opens the attachment, arbitrary code is run that helps the attacker compromise the target's device. Link in Attachment: A type of credential harvest hybrid. An attacker inserts a URL into an email attachment. The URL within the attachment follows the same technique as credential harvest. Link to Malware: Runs some arbitrary code from a file hosted on a well-known file sharing service. The message sent to the user contains a link to this malicious file, opening the file and helping the attacker compromise the target's device. Drive-by URL: The malicious URL in the message takes the user to a familiar-looking website that silently runs and/or installs code on the user's device. OAuth Consent Grant: The malicious URL asks users to grant permissions to data for a malicious Azure Application. License Requirements: Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2.
        References