FortiGuard Labs recently discovered an e-mail using this tactic.
The message was delivered to a coffee company in Ukraine that was seemingly sent by an oil provider in Saudi Arabia.
Purporting to be a purchase order, the partial PDF file image displayed in the body of the email was actually a link to an ISO file hosted in the cloud that contained an executable for GuLoader.
Also known as CloudEye and vbdropper, GuLoader dates to at least 2019 and is generally used to deploy other malware variants, such as Agent Tesla, Formbook, and Lokibot.