The NTLM hash of a user’s password is used in the NTLM challenge-response authentication protocol. Therefore, if you know the user’s NTLM hash, you can impersonate that user for services that rely on NTLM challenge-response.
If you have access to a network share, then you can drop a file in there that will result in a user's NTLM hash being stolen when they navigate to that share.