× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0f5bb3b7d13333c2141f7ee490773c70a919cf6a208c9bd37a3ba790eae48e3e
File name: SKM_4050151222162800-06.doc
Detection ratio: 3 / 54
Analysis date: 2016-01-22 09:26:50 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.d 20160122
F-Secure Trojan:W97M/MaliciousMacro.GEN 20160122
Fortinet WM/Agent!tr 20160122
Ad-Aware 20160122
AegisLab 20160122
Yandex 20160121
AhnLab-V3 20160121
Alibaba 20160122
ALYac 20160122
Antiy-AVL 20160122
Avast 20160122
AVG 20160121
Avira (no cloud) 20160122
Baidu-International 20160122
BitDefender 20160122
Bkav 20160121
ByteHero 20160122
CAT-QuickHeal 20160122
ClamAV 20160122
CMC 20160111
Comodo 20160122
Cyren 20160122
DrWeb 20160122
Emsisoft 20160122
ESET-NOD32 20160122
F-Prot 20160122
GData 20160122
Ikarus 20160122
Jiangmin 20160122
K7AntiVirus 20160122
K7GW 20160122
Kaspersky 20160122
Malwarebytes 20160122
McAfee 20160122
McAfee-GW-Edition 20160122
Microsoft 20160122
eScan 20160122
NANO-Antivirus 20160122
nProtect 20160121
Panda 20160121
Qihoo-360 20160122
Rising 20160122
Sophos AV 20160122
SUPERAntiSpyware 20160122
Symantec 20160121
Tencent 20160122
TheHacker 20160119
TrendMicro 20160122
TrendMicro-HouseCall 20160122
VBA32 20160121
VIPRE 20160122
ViRobot 20160122
Zillya 20160121
Zoner 20160122
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May try to download additional files from the Internet.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2016-01-22 09:10:00
template
Normal
author
3
page_count
2
last_saved
2016-01-22 09:10:00
edit_time
60
word_count
2
revision_number
2
application_name
Microsoft Office Word
character_count
16
code_page
Cyrillic
subject
3
Document summary
category
2
line_count
1
company
Home
characters_with_spaces
17
content_status
2
version
917504
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4800
type_literal
stream
size
114
name
\x01CompObj
sid
18
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
8240
name
1Table
sid
1
type_literal
stream
size
466
name
Macros/PROJECT
sid
16
type_literal
stream
size
89
name
Macros/PROJECTwm
sid
17
type_literal
stream
size
13074
type
macro
name
Macros/VBA/Module1
sid
8
type_literal
stream
size
8576
type
macro
name
Macros/VBA/Module2
sid
9
type_literal
stream
size
1504
type
macro
name
Macros/VBA/ThisDocument
sid
14
type_literal
stream
size
9666
name
Macros/VBA/_VBA_PROJECT
sid
15
type_literal
stream
size
1181
name
Macros/VBA/__SRP_0
sid
10
type_literal
stream
size
131
name
Macros/VBA/__SRP_1
sid
11
type_literal
stream
size
114
name
Macros/VBA/__SRP_4
sid
12
type_literal
stream
size
271
name
Macros/VBA/__SRP_5
sid
13
type_literal
stream
size
595
name
Macros/VBA/dir
sid
7
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 35 bytes
[+] Module2.bas Macros/VBA/Module2 2698 bytes
obfuscated open-file run-file write-file
[+] Module1.bas Macros/VBA/Module1 6126 bytes
exe-pattern create-file create-ole download open-file run-file
ExifTool file metadata
Category
2

HyperlinkBase
4

SharedDoc
No

Author
3

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal

CharCountWithSpaces
17

CreateDate
2016:01:22 08:10:00

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2016:01:22 08:10:00

Company
Home

HyperlinksChanged
No

Characters
16

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
2

FileType
DOC

Lines
1

AppVersion
14.0

Security
None

Software
Microsoft Office Word

TotalEditTime
1.0 minutes

Pages
2

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

Subject
3

File identification
MD5 37467c1ced36e7bcf5696c59202be8d9
SHA1 7be5cdab812eb5605d2a81783649388236e5223f
SHA256 0f5bb3b7d13333c2141f7ee490773c70a919cf6a208c9bd37a3ba790eae48e3e
ssdeep
384:CE0lV7iSdJ7UtktxbVw+t3/dFY6hxhTFaoHKBbKfZbNy/X4xYJLMcdSNyPkMw6XR:CE0lBJguioK6fWBmhNyd0QZ2dEOzXgt

File size 60.5 KB ( 61952 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Subject: 3, Author: 3, Template: Normal, Last Saved By: 1, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Thu Jan 21 08:10:00 2016, Last Saved Time/Date: Thu Jan 21 08:10:00 2016, Number of Pages: 2, Number of Words: 2, Number of Characters: 16, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated open-file exe-pattern doc create-file run-file macros download write-file create-ole

VirusTotal metadata
First submission 2016-01-22 08:53:04 UTC ( 1 year, 10 months ago )
Last submission 2016-03-11 14:25:50 UTC ( 1 year, 8 months ago )
File names ef8616c6cf22a1c0291a81bc705bc0a1
09c828bb1e13376a6530e06d26971597
8b14512c68e93365944b16c9e0c45494
82ccab1e67f8dad4f8f9ca6bdbb55527
676e1e0843d950d6b59649ebda673524
SKM_4050151222162800-06.doc
SKM_4050151222162800.doc
6530c0eeb3d31e9e8127f4409e5b7700
c21a2e0c8700ac73f61bb3c876900ae6
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!