Never open unexpected archives on a host machine. Use a virtual environment or an online tool like VirusTotal to see what the community says about the hash.

The extra step of "extracting" a file builds a psychological sense of legitimacy—the user feels they are performing a necessary task to access a "protected" resource. 2. The "Key" Illusion

The word "Key" in the filename is a masterstroke of social engineering. It implies: You need this to proceed.

A file named Key_Document.pdf.exe . If Windows "Hide extensions for known file types" is on, the user only sees a PDF icon.