Adversaries may rely on a user running a malicious image to facilitate execution.

Tactics
TA0002

Sub-technique of
T1204


See: MITRE ATT&CK