This sample is encrypted and contains bogus code.
In many cases following the code flow of Excel malware is not necessary: using the formula view and our Silicon Excel Emulator is often enough.
From a Twitter post by InQuest, we analyzed an interesting malware:
Encrypted MS Office Document, VBA, Windows Link File (LNK), OLE objects, Windows Help Files (CHM), PNG steganography and Powershell.
The analysis should take about 15-20 minutes in Cerbero Suite.
SPOILER ALERT: The images below show all the steps of our analysis.