An adversary may rely upon a user opening a malicious file in order to gain execution.

Tactics
TA0002

Sub-technique of
T1204


See: MITRE ATT&CK