Analysis Report test.ppsm
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
Source: | File opened: | Jump to behavior |
Source: | File created: | Jump to behavior |
System Summary: |
---|
Document contains an embedded VBA macro which may execute processes | Show sources |
Source: | OLE, VBA macro line: |
Document contains an embedded VBA macro with suspicious strings | Show sources |
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro: | Name: Malicious_File | ||
Source: | OLE, VBA macro: | Name: Malicious_File | ||
Source: | OLE, VBA macro: | Name: Malicious_File |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting2 | Path Interception | Path Interception | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Ingress Tool Transfer1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Scripting2 | LSASS Memory | System Information Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 428845 |
Start date: | 03.06.2021 |
Start time: | 08:16:34 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | test.ppsm |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.expl.winPPSM@1/11@0/0 |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
Created / dropped Files |
---|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1322914 |
Entropy (8bit): | 7.996917351180822 |
Encrypted: | true |
SSDEEP: | 24576:Rq14kFRl5w3G51t8I4IU1UnBcv4k1dpnrwitv5b7bVz58bkE3891:wLRoI4Ix04kz+ih5PbVz58bR3s |
MD5: | C64F21CF0722F454EB1E209D0CAD6150 |
SHA1: | 0240B2FC1615AD3012CA08BF8FFEC0A9C99A13AB |
SHA-256: | FC7CCBE840516D060F385D931BE288D7481E5FE11BF0B5C3BC4E4F003677F61D |
SHA-512: | 6115CC387B2A83C3F9ACC4CF6ACE130A4328A84DB1382919B476F336B3780430E81FAD9216E170E4944AAE2AEFD1D30907181FAFB73D5E4E7C4466EF0D4FAC89 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1039105 |
Entropy (8bit): | 7.996797065086077 |
Encrypted: | true |
SSDEEP: | 24576:ah0W6rz8wgXCLB8cuMX63uEgCp7EMPy0Xb+v/7nT1n:NrwMLYMXIuMxXbM/7pn |
MD5: | 65E39B942B26D80D304FB74324DEDC2D |
SHA1: | 7F1E3381FCAB457D46DC58BF67B4A8D7910EDD13 |
SHA-256: | 04B76F1BBF1CA10409821BE6F1B3A81D428535ACF0B9E221D2D594C6FF4BCA4F |
SHA-512: | 5A41DCC0FADD3E3F960771DCCA481A2C4A46775F8FE359FFC6DE6EC000B65A78244C95848C888E3799B94005C69A0DCC5C03ED8B36A40163B846E2580C095539 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 67888 |
Entropy (8bit): | 7.410686302242833 |
Encrypted: | false |
SSDEEP: | 1536:tpLpUIKMmHKM9F1Bu7YzAYOriG2CwkCJnFs:tpfnk8Y4ijCwkCJnFs |
MD5: | 33753FA3B5A5141763806806F38224D6 |
SHA1: | C6AB280916A85B8D3CC8440B8360BB6EEDF39E83 |
SHA-256: | B5B5C88C86E64FC2BAAE69B8FB2B2EDD4370EB6F512F00849173703FBCFE7236 |
SHA-512: | 281A526E42ED7C3975297257043C4E756B3C711806FB826D360924B230D1A9A291E29117B1057F6FBA731E964CB928036010B051323B6366865E6FAD0D33B881 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 52981 |
Entropy (8bit): | 7.591424432315975 |
Encrypted: | false |
SSDEEP: | 768:PupCf9sMRafM6ta+wjgAVTPYDTgj087xgw7/hoKvUWkTUMiTBcPVzvYunJK7aD:20CXgdj3YDTgj0mxgwKMUW2JYkJb |
MD5: | D8348BA69CAE0FE479B20E207E7A9D61 |
SHA1: | 12051EAB510AE7C7149B4C8282EA91F985809533 |
SHA-256: | BDC396B1ABC7D54AA7E588675EE5B7DE5D254E9CE8120D738BB10C51262BB274 |
SHA-512: | DDFF012A7506866A97D904914A7D47881446448F6AF19EB6C159DCA9A3C308865661966310EA35F2917942F043FB0763BBE7947E60039C72B7EC54E58007EA19 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 597707 |
Entropy (8bit): | 7.994581286957194 |
Encrypted: | true |
SSDEEP: | 12288:188AxbihVTXHIjJVI1+/3/uU5ttv+iYfvwfO:u8AbWIjJVI1S3/ZXv+Vf7 |
MD5: | 663173125365C1951ACA4C6321202F1D |
SHA1: | 260DFE199A218B39E28BD466E19045A82EBD000F |
SHA-256: | E0CDD32C776D44C6A3558B7890B1EE99E7F1E1A476CB31FAF2DBD2248F7270F6 |
SHA-512: | 86B52DF4EEF7D8034F7C629D3B7D87DEB2D87F79B204E055415F0735EFDF5F328CA8522D8137AF554561EA38D4E0E6E0ADCD252EACA9EB021247785F0A53B4B6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1676371 |
Entropy (8bit): | 7.998189506384485 |
Encrypted: | true |
SSDEEP: | 49152:ANYzajHQTh2GxyDqPNJ6EpAjmPrEL7VK3cKmF:YawMhLgq76BjB7+cV |
MD5: | F3EEC0D9E13521FDE11A66E2153038F6 |
SHA1: | 24F40F91B0036932D864D815015309238DDD7187 |
SHA-256: | B330F0FE946812BBA4C6A431FAC385744CD3A1AC0B35647B89074A8D7D2ADCB5 |
SHA-512: | E56C692415857C854AF734A4D9D0CB7B1A9D1C2C51107B6E678B3B48571CC70104CB9C6C1F13DAC2072E6254687FEFC03518DBC3B167A7410E99579530EB7986 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 52 |
Entropy (8bit): | 3.8999991615491365 |
Encrypted: | false |
SSDEEP: | 3:HaLSJ9pSmxWaLSv:HCgL7c |
MD5: | D6BFC5395D1EE511AF3B1E56D5DDBB0F |
SHA1: | 1E6799F992873A79B3DE3D9AF4691DA10DA7CB1C |
SHA-256: | 7EB8B74233CC568DB2FA5E5248CFC870306A81EFF543E327CE8F16745C6E0644 |
SHA-512: | 2CCD3C0B24CE033720765D9822E98F3719C7014748D42D99D9D5B89A2546D5687D30549B4F2351547656C39AF820B3CDDD74A77B74BB776E9D93B8283EC78A37 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1974 |
Entropy (8bit): | 4.505710769121066 |
Encrypted: | false |
SSDEEP: | 48:8e/XT0jFUfVJbIxhQh2e/XT0jFUfVJbIxhQ/:8e/XojFUVohQh2e/XojFUVohQ/ |
MD5: | 243251350062EC6DA0142F4C1F2C0D1F |
SHA1: | 6AAF2BEE918A4F7A44C7D971EF2725EB5D07604B |
SHA-256: | 86AB7F887511AAE3E0E4DBDE90CA93FFD1F79C8C52B74CAAC15FC61B75D649B0 |
SHA-512: | B859A5BEF08C6B7606DB408DA647367C40C1B514141D305F01477FA31D7F39A34E8A64BB765A3358E21EC81174C7687345E21F268F3190610634A00190EF84AD |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4816307 |
Entropy (8bit): | 7.997481132276751 |
Encrypted: | true |
SSDEEP: | 98304:8LR74+PkzR5oR9t6L9v+zfcM4uMZM/N9TawMhLgq76BjB7+cf:MlZM5oR9t6ZHM4u+MF9TaXB7IBz |
MD5: | 422A649BF92C722963236C5CC6FF34EA |
SHA1: | 2095A8BC45320F9D8A4654D3CABE83258BEAEB49 |
SHA-256: | 562773D99E837AAE5BF8AC515B2CF538AC06CBDD8DC087D831B7CA0C418A5B92 |
SHA-512: | 37888C176F049F1AF885447330CDDAE6E68F3AEC758096F49E3E332408AD393038C824C9FCD93414BA24A4CEE3F6D855633074106728312BE8E68020B4677A0F |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 165 |
Entropy (8bit): | 1.4426651152920147 |
Encrypted: | false |
SSDEEP: | 3:vTFDJw2fV:vTFGS |
MD5: | 0E60104DE3CE99B9DED6F2DA9722B110 |
SHA1: | 67200E231E7781D2F4EDB148A7B0D82E147BA1AD |
SHA-256: | 9FA22361697857804FA6686A0778E3F40D705525A3497DCCA369C6FAC1D9C44C |
SHA-512: | AEDC126BB4F909F4B662192A6F1CE250000BE194FB1F56E18EAFBCFFABFF0DFFC548320CAD2836408B944B948A94D965B211C18F01844EF4943A9E6C9B13C9E0 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.9975334880874565 |
TrID: |
|
File name: | test.ppsm |
File size: | 4802837 |
MD5: | 99a4963b54d93b286ff5de714c7f5010 |
SHA1: | 66fb2a56df63e96af7b43b843a918370a8763147 |
SHA256: | 61af0a3d3d4d9b0a52b94b96830adc7bbe000f626c02c8914b001c155e90d9da |
SHA512: | 10730a459c46e01eb1d3cc6191a64ed92dc3faa650507a1f5164dbd4c74b5c5eb5334e8c11abddf211e90ea61b96a0a1a270b8ee60e9cddb6b94ec87a3aaf969 |
SSDEEP: | 98304:BPLR74+PkzR5oRJt6L9v+jfcM4uMZM/NjGawMhLgq76BjB7+cb:ZlZM5oRJt6ZjM4u+MFjGaXB7IBH |
File Content Preview: | PK..........!...pP............[Content_Types].xml ...(......................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | e4e4e6b0b8bcb8da |
Static OLE Info |
---|
General | ||
---|---|---|
Document Type: | OpenXML | |
Number of OLE Files: | 1 |
OLE File "/opt/package/joesandbox/database/analysis/428845/sample/test.ppsm" |
---|
Indicators | |
---|---|
Has Summary Info: | False |
Application Name: | unknown |
Encrypted Document: | False |
Contains Word Document Stream: | |
Contains Workbook/Book Stream: | |
Contains PowerPoint Document Stream: | |
Contains Visio Document Stream: | |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: | True |
Summary | |
---|---|
Title: | |
Author: | |
Template: | |
Last Saved By: | |
Revion Number: | 17 |
Total Edit Time: | 237 |
Create Time: | 2021-04-26T04:52:20Z |
Last Saved Time: | 2021-05-27T01:34:49Z |
Number of Words: | 4 |
Creating Application: |
Document Summary | |
---|---|
Number of Paragraphs: | 2 |
Thumbnail Scaling Desired: | false |
Company: | |
Contains Dirty Links: | false |
Shared Document: | false |
Changed Hyperlinks: | false |
Application Version: | 16.0000 |
Streams with VBA |
---|
VBA File Name: Module1.bas, Stream Size: 2041 |
---|
General | |
---|---|
Stream Path: | VBA/Module1 |
VBA File Name: | Module1.bas |
Stream Size: | 2041 |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . m N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 01 16 03 00 00 f0 00 00 00 ea 04 00 00 d4 00 00 00 b0 01 00 00 ff ff ff ff f1 04 00 00 a9 06 00 00 00 00 00 00 01 00 00 00 ed 6d 4e e4 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
VBA Code Keywords |
---|
Keyword |
---|
Environ("temp") |
strTxt; |
VB_Name |
VBA.CreateObject("WScript.Shell") |
Malicious_File() |
%username% |
%username%-%os%-%PROCESSOR_ARCHITECTURE%" |
wsh.Run |
Output |
vbMinimizedNoFocus |
"cmd.exe |
Attribute |
Close |
Object: |
VBA Code |
---|
|
Streams |
---|
Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 461 |
---|
General | |
---|---|
Stream Path: | PROJECT |
File Type: | ASCII text, with CRLF line terminators |
Stream Size: | 461 |
Entropy: | 5.15492702891 |
Base64 Encoded: | True |
Data ASCII: | I D = " { 0 0 0 0 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0 } " . . P a c k a g e = { A C 9 F 2 F 9 0 - E 8 7 7 - 1 1 C E - 9 F 6 8 - 0 0 A A 0 0 5 7 4 A 4 F } . . M o d u l e = M o d u l e 1 . . H e l p F i l e = " " . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 9 0 9 2 3 C 3 A 4 0 3 A 4 0 3 E 4 4 3 E 4 4 " . . D P B = " 2 0 2 2 8 C D 3 A 9 D 3 A 9 2 C 5 7 D 4 A B 9 C E 7 1 F |
Data Raw: | 49 44 3d 22 7b 30 30 30 30 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 30 30 30 30 30 30 30 30 7d 22 0d 0a 50 61 63 6b 61 67 65 3d 7b 41 43 39 46 32 46 39 30 2d 45 38 37 37 2d 31 31 43 45 2d 39 46 36 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 0d 0a 4d 6f 64 75 6c 65 3d 4d 6f 64 75 6c 65 31 0d 0a 48 65 6c 70 46 69 6c 65 3d 22 22 0d 0a 4e 61 6d 65 3d 22 |
Stream Path: PROJECTwm, File Type: data, Stream Size: 26 |
---|
General | |
---|---|
Stream Path: | PROJECTwm |
File Type: | data |
Stream Size: | 26 |
Entropy: | 2.50738010242 |
Base64 Encoded: | False |
Data ASCII: | M o d u l e 1 . M . o . d . u . l . e . 1 . . . . . |
Data Raw: | 4d 6f 64 75 6c 65 31 00 4d 00 6f 00 64 00 75 00 6c 00 65 00 31 00 00 00 00 00 |
Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3196 |
---|
General | |
---|---|
Stream Path: | VBA/_VBA_PROJECT |
File Type: | data |
Stream Size: | 3196 |
Entropy: | 4.44450739494 |
Base64 Encoded: | False |
Data ASCII: | . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . |
Data Raw: | cc 61 b2 00 00 03 00 ff 12 04 00 00 09 04 00 00 b5 03 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00 |
Stream Path: VBA/dir, File Type: data, Stream Size: 717 |
---|
General | |
---|---|
Stream Path: | VBA/dir |
File Type: | data |
Stream Size: | 717 |
Entropy: | 6.34806419391 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . U . . b . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . - |
Data Raw: | 01 c9 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 b5 03 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 55 1f 89 62 07 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47 |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
General |
---|
Start time: | 08:17:36 |
Start date: | 03/06/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13fa40000 |
File size: | 2163560 bytes |
MD5 hash: | EBBBEF2CCA67822395E24D6E18A3BDF6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Disassembly |
---|
Call Graph |
---|
Graph
- Entrypoint
- Decryption Function
- Executed
- Not Executed
- Show Help
Module: Module1 |
---|
Declaration |
---|
Line | Content |
---|---|
1 | Attribute VB_Name = "Module1" |
Non-Executed Functions |
---|
APIs | Meta Information |
---|---|
CreateObject | |
Open | |
Environ | |
strTxt | |
Run | |
vbMinimizedNoFocus |
Strings | Decrypted Strings |
---|---|
"WScript.Shell" | |
"temp" | |
"msg %username% %username%-%os%-%PROCESSOR_ARCHITECTURE%" | |
"cmd.exe /c %temp%\art1204.bat" |
Line | Instruction | Meta Information |
---|---|---|
2 | Sub Malicious_File() | |
3 | Dim wsh as Object | |
3 | Set wsh = VBA.CreateObject("WScript.Shell") | CreateObject |
4 | Open Environ("temp") & "\art1204.bat" For Output As # 1 | Open Environ |
5 | Print # 1, strTxt ; "msg %username% %username%-%os%-%PROCESSOR_ARCHITECTURE%" | strTxt |
6 | Close # 1 | |
7 | wsh.Run "cmd.exe /c %temp%\art1204.bat", vbMinimizedNoFocus | Run vbMinimizedNoFocus |
8 | End Sub |