Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.
The MITRE Corporation. (2024). MITRE ATT&CK Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/