What is a Windows Ribbon Markup compiler?
the file shown is a fake windows ribbon markup compiler, naming the infostealer using a legitimate microsoft file name is a part of obfuscation
How does this generally make it on to a victim's device?
email attachment (can be easily blocked by policy) or download link (download to user space; launch from there can easily be blocked by policy) are the most common attack vector
could use weaponized office document or even script that user launches and then file download in background, drive by download on older misconfigured systems, replace a malicious file in a legitimate file download bucket
there are many potential vectors
the infostealer shown is part of maas (malware as a service) available for purchase on dark web, it employs low hanging fruit type attacks that rely upon basic user mistakes, this is not in the arena of a sophisticated attack
Company: Microsoft Corporation, digitally signed with a Sony certificate. Is this normal?
the digital signature is done by sony and is fake
the digital certificate is not issued by sony (she deliberately did not show certificate details)
basic level, the way micrsoft authenticode works, a digital certificate is purchased (applied for), the certificate authority is supposed to do due diligence to verify applicant, the certificate is issued to the applicant (with a date range within which the applicant must apply the digital certificate to the file; that is signature date\time stamp you see when first open a signed file properties, if the file is not signed within the date range issued by the certificate authority the certificate is nullified in the certificate database), the digital certificate is accessed properties > details > view certificate, the digital certificate validity date can be seen, it is years beyond the signature time stamp range
there are techniques that can be used to apply fake certificates or ways to make a file appear that it is legitimately signed, then there is a completely separate method where stolen certificate is applied, these methods are mainly figured out by the criminals through persistent efforts of trial and error, much information about such is online
a file digital signature is not the same as the digital certificate