× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
File name: G-A0287580036267754265.doc
Detection ratio: 40 / 58
Analysis date: 2017-07-25 05:11:30 UTC ( 3 hours, 34 minutes ago )
Antivirus Result Update
Ad-Aware w97m.Downloader.ACZ 20170725
AegisLab Troj.Downloader.Msword!c 20170725
AhnLab-V3 W97M/Downloader 20170725
ALYac w97m.Downloader.ACZ 20170725
Antiy-AVL Trojan[Downloader]/MSWord.Agent.vj 20170725
Arcabit HEUR.VBA.Trojan.d 20170725
Avast VBA:Downloader-RW [Trj] 20170725
AVG VBA:Downloader-RW [Trj] 20170725
Baidu VBA.Trojan-Downloader.Agent.my 20170725
BitDefender w97m.Downloader.ACZ 20170725
CAT-QuickHeal W97M.Dropper.MA 20170724
Comodo TrojWare.W97M.Agent.~AA 20170725
Cyren W97M/Downldr 20170725
DrWeb W97M.DownLoader.691 20170725
Emsisoft w97m.Downloader.ACZ (B) 20170725
ESET-NOD32 VBA/TrojanDownloader.Agent.AFT 20170725
F-Prot New or modified W97M/Downldr 20170725
F-Secure Trojan-Downloader:W97M/Dridex.R 20170725
Fortinet WM/Agent!tr 20170725
GData Macro.Trojan-Downloader.Agent.KF 20170725
Ikarus Trojan-Downloader.VBA.Agent 20170724
Jiangmin Trojan-Downloader/MSWord.Agent.uh 20170725
Kaspersky Trojan-Downloader.MSWord.Agent.vj 20170725
MAX malware (ai score=80) 20170725
McAfee W97M/Downloader.atv 20170723
McAfee-GW-Edition W97M/Downloader.atv 20170724
Microsoft TrojanDownloader:O97M/Donoff 20170725
eScan w97m.Downloader.ACZ 20170725
NANO-Antivirus Trojan.Script.Agent.dyqfbn 20170725
Panda O97M/Downloader 20170724
Qihoo-360 virus.office.obfuscated.1 20170725
Rising Heur.Macro.Downloader.e (classic) 20170725
Sophos AV Troj/DocDl-ADJ 20170725
Symantec W97M.Downloader 20170725
Tencent Word.Trojan-downloader.Agent.Wtoe 20170725
TrendMicro W2KM_DRIDEX.NAJ 20170725
TrendMicro-HouseCall W2KM_DRIDEX.NAJ 20170725
VBA32 Trojan-Downloader.MSWord.Agent.vj 20170724
ViRobot W97M.S.Downloader.115712 20170725
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20170725
Alibaba 20170725
Avira (no cloud) 20170724
AVware 20170721
Bkav 20170724
ClamAV 20170725
CMC 20170725
CrowdStrike Falcon (ML) 20170710
Cylance 20170725
Endgame 20170721
Sophos ML 20170607
K7AntiVirus 20170725
K7GW 20170725
Kingsoft 20170725
Malwarebytes 20170725
nProtect 20170725
Palo Alto Networks (Known Signatures) 20170725
SentinelOne (Static ML) 20170718
SUPERAntiSpyware 20170725
Symantec Mobile Insight 20170725
TheHacker 20170724
TotalDefense 20170725
Trustlook 20170725
VIPRE 20170725
Webroot 20170725
WhiteArmor 20170721
Yandex 20170724
Zillya 20170724
Zoner 20170725
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May try to download additional files from the Internet.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2015-10-26 09:25:00
template
Normal
author
1
page_count
1
last_saved
2015-10-26 09:25:00
revision_number
2
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
company
Home
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3584
type_literal
stream
size
114
name
\x01CompObj
sid
15
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
11322
name
1Table
sid
1
type_literal
stream
size
517
name
Macros/PROJECT
sid
14
type_literal
stream
size
113
name
Macros/PROJECTwm
sid
13
type_literal
stream
size
26526
type
macro
name
Macros/VBA/Module1
sid
8
type_literal
stream
size
25638
type
macro
name
Macros/VBA/Module2
sid
9
type_literal
stream
size
14510
type
macro
name
Macros/VBA/Module3
sid
10
type_literal
stream
size
2104
type
macro
name
Macros/VBA/ThisDocument
sid
7
type_literal
stream
size
16104
name
Macros/VBA/_VBA_PROJECT
sid
11
type_literal
stream
size
617
name
Macros/VBA/dir
sid
12
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 146 bytes
[+] Module1.bas Macros/VBA/Module1 13612 bytes
exe-pattern create-file create-ole download obfuscated open-file write-file
[+] Module2.bas Macros/VBA/Module2 11773 bytes
exe-pattern create-ole obfuscated open-file run-file write-file
[+] Module3.bas Macros/VBA/Module3 6621 bytes
exe-pattern create-ole obfuscated run-file
ExifTool file metadata
SharedDoc
No

Author
1

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal

CharCountWithSpaces
0

CreateDate
2015:10:26 08:25:00

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2015:10:26 08:25:00

Company
Home

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
0

AppVersion
14.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
0

Compressed bundles
File identification
MD5 6ecc60f8b140ed5feed8dbe0bce1a7ad
SHA1 85bdb56011fe8a39b5fdb4661674105e08f5c667
SHA256 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
ssdeep
3072:d33rIyaiGpmt1shZBUXMwW9G3TxmE24NPXqHC:tbIbzrGjXq

File size 113.0 KB ( 115712 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Template: Normal, Last Saved By: 1, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Oct 25 08:25:00 2015, Last Saved Time/Date: Sun Oct 25 08:25:00 2015, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated open-file exe-pattern doc create-file run-file macros attachment download write-file create-ole

VirusTotal metadata
First submission 2015-10-26 09:21:08 UTC ( 1 year, 9 months ago )
Last submission 2015-11-19 23:09:31 UTC ( 1 year, 8 months ago )
File names 46c85ff074da88831b83179e250ff79e
11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50.doc.000
invoice-2425.doc.file
86621e765ba64c845260dbcfa45eccd3
460c995959217d35045c6cc96bb02e05
55cb4213f63fe2adf01107ea8c16734c
5900fc079217ceb6d3337ca1b6e6ad8b
b9166a351f5716ed75e06ea0bc720f40
invoice-2425.doc
invoice-2425.doc.file
invoice-2425.doc.mal.bin
aae8196dc0cc1c4f72c18888bd40f898
1.doc
0f99168332035718251d7274a5a0c660
G-A0287580036267754265.doc
G-A0287580036267754265-08.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!