61 - Cyber Kill Chain - Post Exploitation - Installation

The delivered malware exploits the vulnerabilities, allowing the attacker to execute code on the victim system.