× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0c75cdcb3d1425eadba7e73cc6684c9a4d77c9b013cb10625b6c0a7c928aa11b
File name: Invoice-1228407.doc
Detection ratio: 3 / 54
Analysis date: 2016-01-11 09:38:24 UTC ( 1 year, 5 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan 20160111
F-Secure Trojan:W97M/MaliciousMacro.GEN 20160111
Qihoo-360 heur.macro.download.cc 20160111
Ad-Aware 20160111
AegisLab 20160111
Yandex 20160108
AhnLab-V3 20160111
Alibaba 20160111
ALYac 20160111
Antiy-AVL 20160111
Avast 20160111
AVG 20160111
AVware 20160111
Baidu-International 20160111
BitDefender 20160111
Bkav 20160109
ByteHero 20160111
CAT-QuickHeal 20160111
ClamAV 20160110
CMC 20160111
Comodo 20160111
Cyren 20160111
DrWeb 20160111
Emsisoft 20160111
ESET-NOD32 20160111
F-Prot 20160111
Fortinet 20160111
GData 20160111
Ikarus 20160111
Jiangmin 20160111
K7AntiVirus 20160111
K7GW 20160111
Kaspersky 20160111
Malwarebytes 20160111
McAfee 20160111
McAfee-GW-Edition 20160111
Microsoft 20160111
eScan 20160111
NANO-Antivirus 20160111
nProtect 20160108
Panda 20160110
Rising 20160111
Sophos 20160111
SUPERAntiSpyware 20160111
Symantec 20160110
Tencent 20160111
TheHacker 20160107
TrendMicro 20160111
TrendMicro-HouseCall 20160111
VBA32 20160107
VIPRE 20160111
ViRobot 20160111
Zillya 20160110
Zoner 20160111
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May enumerate open windows.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2016-01-11 08:55:00
template
Normal
author
1
page_count
1
last_saved
2016-01-11 08:55:00
revision_number
2
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
company
Home
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
8000
type_literal
stream
size
114
name
\x01CompObj
sid
19
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
6734
name
1Table
sid
1
type_literal
stream
size
427
name
Macros/PROJECT
sid
17
type_literal
stream
size
65
name
Macros/PROJECTwm
sid
18
type_literal
stream
size
35575
type
macro
name
Macros/VBA/Module1
sid
8
type_literal
stream
size
1615
type
macro
name
Macros/VBA/ThisDocument
sid
15
type_literal
stream
size
3738
name
Macros/VBA/_VBA_PROJECT
sid
16
type_literal
stream
size
10581
name
Macros/VBA/__SRP_0
sid
9
type_literal
stream
size
186
name
Macros/VBA/__SRP_1
sid
10
type_literal
stream
size
103
name
Macros/VBA/__SRP_2
sid
11
type_literal
stream
size
348
name
Macros/VBA/__SRP_3
sid
12
type_literal
stream
size
6394
name
Macros/VBA/__SRP_4
sid
13
type_literal
stream
size
547
name
Macros/VBA/__SRP_5
sid
14
type_literal
stream
size
572
name
Macros/VBA/dir
sid
7
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 44 bytes
[+] Module1.bas Macros/VBA/Module1 19990 bytes
exe-pattern create-file create-ole enum-windows obfuscated open-file run-file write-file
ExifTool file metadata
SharedDoc
No

Author
1

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal

CharCountWithSpaces
0

CreateDate
2016:01:11 07:55:00

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2016:01:11 07:55:00

Company
Home

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
0

AppVersion
14.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
0

Compressed bundles
File identification
MD5 5cfb3aea0ee14d3ac0d35bea5601bba2
SHA1 ca08922392eeeb485e2be01569ab228ef33573a0
SHA256 0c75cdcb3d1425eadba7e73cc6684c9a4d77c9b013cb10625b6c0a7c928aa11b
ssdeep
768:5UJgZWYFa6YKkKTwTNcMh1ToliELeLeEe5dkruBeE7YLPBZPMb2S51miR9qXGT:19a1Kk+wTWa1TolrLaeEZLLLdU9a

File size 83.5 KB ( 85504 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Template: Normal, Last Saved By: 1, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Jan 10 07:55:00 2016, Last Saved Time/Date: Sun Jan 10 07:55:00 2016, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (35.3%)
Microsoft PowerPoint document (34.8%)
Microsoft Word document (old ver.) (20.9%)
Generic OLE2 / Multistream Compound File (8.8%)
Tags
obfuscated open-file enum-windows exe-pattern doc create-file run-file macros write-file create-ole

VirusTotal metadata
First submission 2016-01-11 09:00:07 UTC ( 1 year, 5 months ago )
Last submission 2016-09-11 15:05:34 UTC ( 9 months, 2 weeks ago )
File names a7fb4af8e1b95c5e3ee534fabe0a3abf
Invoice-1228407.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!