With metasploit, it's possible to get any windows binary file and use it as a backdoor on a victims computer. You can gain metapreter shell at any point. All that needed is to embed the metasploit payload into any executable that you want. Below is a step by step instructional video