This can be easily blocked by HIPS who monitor for file modification. Basically, you can compare file infectors with ransomware, which also modifies files on disk.