Yeah, it's a very common technique that hackers use. It's also usually the way pentests are done.
I once talked with a cybersec expert, who told a story about how he managed to complete a pentest in the time it took the manager to explain what was expected of him, simply because all 4 USB sticks that he dropped were used.
Same with "secured" office files. If you receive a file, Windows Office always open it in "protected mode", which you can then re-open in "edit mode". A common hacking method is to "lock" the file, showing only a large square, with the request to enable edit mode to access the rest of the file. But, it's likely a macro that executes the virus as soon as you open it in edit mode.