Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims.

Tactics
TA0003 TA0004

Sub-technique of
T1546


See: MITRE ATT&CK