× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 069ff6dca25b828171a73beb093055320d309bc9143a1ae5b540465c655192c4
File name: (INV)ODV129707734.doc
Detection ratio: 14 / 60
Analysis date: 2018-07-24 09:27:42 UTC ( 10 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20180724
Baidu VBA.Trojan-Downloader.Agent.ddo 20180724
Fortinet VBA/Agent.C313!tr.dldr 20180724
K7AntiVirus Trojan ( 00536d111 ) 20180724
K7GW Trojan ( 00536d111 ) 20180724
McAfee Downloader-FBSP!94667B751CA7 20180724
McAfee-GW-Edition BehavesLike.Downloader.cg 20180724
Microsoft TrojanDownloader:O97M/Donoff 20180724
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20180724
Qihoo-360 virus.office.qexvmc.1075 20180724
Symantec ISB.Downloader!gen69 20180724
TACHYON Suspicious/W97M.Obfus.Gen 20180724
Tencent Heur.Macro.Generic.Gen.f 20180724
Zoner Probably W97Obfuscated 20180723
Ad-Aware 20180724
AegisLab 20180724
AhnLab-V3 20180723
Alibaba 20180713
ALYac 20180724
Antiy-AVL 20180724
Avast 20180724
Avast-Mobile 20180724
AVG 20180724
Avira (no cloud) 20180724
AVware 20180724
Babable 20180406
BitDefender 20180724
Bkav 20180723
CAT-QuickHeal 20180723
ClamAV 20180724
CMC 20180724
Comodo 20180724
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180724
Cyren 20180724
DrWeb 20180724
eGambit 20180724
Emsisoft 20180724
Endgame 20180711
ESET-NOD32 20180724
F-Prot 20180724
F-Secure 20180724
GData 20180724
Ikarus 20180724
Sophos ML 20180717
Jiangmin 20180724
Kaspersky 20180724
Kingsoft 20180724
Malwarebytes 20180724
MAX 20180724
eScan 20180724
Palo Alto Networks (Known Signatures) 20180724
Panda 20180723
Rising 20180724
SentinelOne (Static ML) 20180701
Sophos AV 20180724
SUPERAntiSpyware 20180724
TheHacker 20180723
TotalDefense 20180722
TrendMicro 20180724
TrendMicro-HouseCall 20180724
Trustlook 20180724
VBA32 20180723
VIPRE 20180724
ViRobot 20180724
Webroot 20180724
Yandex 20180720
Zillya 20180723
ZoneAlarm by Check Point 20180724
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-07-24 09:21:00
revision_number
1
author
Ecyluv-PC
page_count
1
last_saved
2018-07-24 09:21:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
1
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4736
type_literal
stream
sid
18
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
412
type_literal
stream
sid
2
name
1Table
size
9612
type_literal
stream
sid
1
name
Data
size
42348
type_literal
stream
sid
16
name
Macros/PROJECT
size
444
type_literal
stream
sid
17
name
Macros/PROJECTwm
size
77
type_literal
stream
sid
14
name
Macros/VBA/_VBA_PROJECT
size
28212
type_literal
stream
sid
9
name
Macros/VBA/__SRP_0
size
1471
type_literal
stream
sid
10
name
Macros/VBA/__SRP_1
size
106
type_literal
stream
sid
11
name
Macros/VBA/__SRP_2
size
880
type_literal
stream
sid
12
name
Macros/VBA/__SRP_3
size
439
type_literal
stream
sid
8
name
Macros/VBA/dir
size
584
type_literal
stream
sid
13
type
macro
name
Macros/VBA/jYzMtfRzD
size
18367
type_literal
stream
sid
15
type
macro
name
Macros/VBA/jjrzAnWBkJEZpQ
size
34797
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] jYzMtfRzD.cls Macros/VBA/jYzMtfRzD 9604 bytes
obfuscated run-file
[+] jjrzAnWBkJEZpQ.bas Macros/VBA/jjrzAnWBkJEZpQ 19655 bytes
obfuscated
ExifTool file metadata
SharedDoc
No

Author
Ecyluv-PC

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

CreateDate
2018:07:24 07:21:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:07:24 07:21:00

Characters
1

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 94667b751ca72a2031b695916d770626
SHA1 a9ccfd892682aa7bf5bf2c50ec8fdefac4f7def2
SHA256 069ff6dca25b828171a73beb093055320d309bc9143a1ae5b540465c655192c4
ssdeep
3072:MxjnB29gb8onnuwDMbvFuVOZMNkTdjMzlDqJu:MxyIuwD+vFuVvuTd7Ju

File size 156.4 KB ( 160128 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Ecyluv-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Jul 23 08:21:00 2018, Last Saved Time/Date: Mon Jul 23 08:21:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-07-24 09:27:42 UTC ( 10 months ago )
Last submission 2018-07-24 09:39:51 UTC ( 10 months ago )
File names Rechnung-KYL10611788263.doc
(INV)RK105292068866688.doc
(INV)ODV129707734.doc
Zahlungsschreiben-PHT300527127190578.doc
(INV)LFQ284045509.doc
DHL number - Dienstag, 14:00-19:00 Uhr.doc
IhreRechnung-TOJ166821067.doc
Rechnung-SVL4448368.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!