An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.
Description
Consequences
Relationships
Related ATT&CK Techniques
2