× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 12f8564cfb7cb36a6986d9d5995a654613e9340b3eb69c3c027567e8a43d6f7a
File name: order_details.doc
Detection ratio: 12 / 58
Analysis date: 2019-01-16 14:51:51 UTC ( 4 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20190116
Emsisoft Trojan-Downloader.Agent (A) 20190116
Endgame malicious (high confidence) 20181108
Fortinet VBA/Agent.1F50!tr.dldr 20190116
Ikarus Trojan-Downloader.VBA.Agent 20190116
McAfee W97M/Downloader.gu 20190116
McAfee-GW-Edition BehavesLike.Downloader.ng 20190116
Qihoo-360 virus.office.obfuscated.1 20190116
SentinelOne (Static ML) static engine - malicious 20181223
Symantec ISB.Downloader!gen186 20190116
TACHYON Suspicious/W97M.Obfus.Gen.6 20190116
Zoner Probably W97Obfuscated 20190116
Acronis 20190116
Ad-Aware 20190116
AegisLab 20190116
AhnLab-V3 20190116
Alibaba 20180921
ALYac 20190116
Antiy-AVL 20190116
Avast 20190115
Avast-Mobile 20190116
AVG 20190116
Avira (no cloud) 20190116
Babable 20180918
Baidu 20190116
BitDefender 20190116
Bkav 20190116
CAT-QuickHeal 20190116
ClamAV 20190116
CMC 20190116
Comodo 20190116
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190116
Cyren 20190116
DrWeb 20190116
eGambit 20190116
ESET-NOD32 20190116
F-Prot 20190116
F-Secure 20190116
GData 20190116
Sophos ML 20181128
Jiangmin 20190116
K7AntiVirus 20190116
K7GW 20190116
Kaspersky 20190116
Kingsoft 20190116
Malwarebytes 20190116
MAX 20190116
Microsoft 20190116
eScan 20190116
NANO-Antivirus 20190116
Palo Alto Networks (Known Signatures) 20190116
Panda 20190116
Rising 20190116
Sophos AV 20190116
SUPERAntiSpyware 20190109
Tencent 20190116
TheHacker 20190115
Trapmine 20190103
TrendMicro 20190116
TrendMicro-HouseCall 20190116
Trustlook 20190116
VBA32 20190116
ViRobot 20190115
Webroot 20190116
Yandex 20190116
Zillya 20190115
ZoneAlarm by Check Point 20190116
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
creation_datetime
2019-01-16 12:40:00
revision_number
1
page_count
1
word_count
13
last_saved
2019-01-16 12:40:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
80
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
92
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
24704
type_literal
stream
sid
38
name
\x01CompObj
size
114
type_literal
stream
sid
12
name
\x05DocumentSummaryInformation
size
280
type_literal
stream
sid
11
name
\x05SummaryInformation
size
404
type_literal
stream
sid
10
name
1Table
size
7954
type_literal
stream
sid
1
name
Data
size
29684
type_literal
stream
sid
37
name
Macros/PROJECT
size
1187
type_literal
stream
sid
36
name
Macros/PROJECTwm
size
512
type_literal
stream
sid
28
type
macro (only attributes)
name
Macros/VBA/Agentww
size
986
type_literal
stream
sid
20
type
macro (only attributes)
name
Macros/VBA/Avonnj
size
674
type_literal
stream
sid
18
type
macro
name
Macros/VBA/Chiefua
size
5969
type_literal
stream
sid
25
type
macro (only attributes)
name
Macros/VBA/Courserl
size
987
type_literal
stream
sid
19
type
macro
name
Macros/VBA/Directws
size
3424
type_literal
stream
sid
31
type
macro (only attributes)
name
Macros/VBA/HomeLoanAccountfq
size
997
type_literal
stream
sid
15
type
macro (only attributes)
name
Macros/VBA/HomeLoanAccountht
size
1314
type_literal
stream
sid
22
type
macro (only attributes)
name
Macros/VBA/Macedoniaro
size
680
type_literal
stream
sid
29
type
macro (only attributes)
name
Macros/VBA/Paradigmii
size
989
type_literal
stream
sid
26
type
macro (only attributes)
name
Macros/VBA/SriLankans
size
989
type_literal
stream
sid
24
type
macro (only attributes)
name
Macros/VBA/ZambianKwachaqd
size
684
type_literal
stream
sid
32
name
Macros/VBA/_VBA_PROJECT
size
11299
type_literal
stream
sid
34
name
Macros/VBA/__SRP_0
size
2231
type_literal
stream
sid
35
name
Macros/VBA/__SRP_1
size
238
type_literal
stream
sid
16
name
Macros/VBA/__SRP_2
size
356
type_literal
stream
sid
17
name
Macros/VBA/__SRP_3
size
105
type_literal
stream
sid
33
name
Macros/VBA/dir
size
1497
type_literal
stream
sid
27
type
macro (only attributes)
name
Macros/VBA/localrh
size
986
type_literal
stream
sid
23
type
macro (only attributes)
name
Macros/VBA/maximizehb
size
679
type_literal
stream
sid
30
type
macro (only attributes)
name
Macros/VBA/strategicnw
size
989
type_literal
stream
sid
21
type
macro (only attributes)
name
Macros/VBA/synergieshn
size
680
type_literal
stream
sid
6
name
ObjectPool/_1609154803/\x01CompObj
size
116
type_literal
stream
sid
8
name
ObjectPool/_1609154803/\x03OCXNAME
size
20
type_literal
stream
sid
7
name
ObjectPool/_1609154803/\x03ObjInfo
size
6
type_literal
stream
sid
5
name
ObjectPool/_1609154803/\x03PRINT
size
502
type_literal
stream
sid
9
name
ObjectPool/_1609154803/contents
size
1240
type_literal
stream
sid
2
name
WordDocument
size
4096
Macros and VBA code streams
[+] Chiefua.bas Macros/VBA/Chiefua 3807 bytes
create-ole obfuscated run-file
[+] Directws.bas Macros/VBA/Directws 1524 bytes
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
92

CreateDate
2019:01:16 11:40:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:01:16 11:40:00

Characters
80

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
13

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 02482e94399dacdec65dd312da8459c5
SHA1 8d894ff366082d446f35df74dcb3dedc64a0e72c
SHA256 12f8564cfb7cb36a6986d9d5995a654613e9340b3eb69c3c027567e8a43d6f7a
ssdeep
768:KVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFB3MB4zy2Gf37mYCp4DXUyZpOGanwrQ:Kocn1kp59gxBK85fBU4oXAwohX+a95

File size 95.8 KB ( 98048 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Jan 15 11:40:00 2019, Last Saved Time/Date: Tue Jan 15 11:40:00 2019, Number of Pages: 1, Number of Words: 13, Number of Characters: 80, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated run-file doc macros attachment create-ole

VirusTotal metadata
First submission 2019-01-16 14:48:20 UTC ( 4 months ago )
Last submission 2019-01-18 21:47:49 UTC ( 4 months ago )
File names 8349_263_201901_Rechnung.doc
ORDER_DETAILS_FILE.doc
FA01291_1.doc
773_RNG_012019.doc
524484_201901_Rechnung.doc
201901_0983_808_RNG.doc
order_details_form.doc
RNG_012019_5690_855.doc
FA0922_40.doc
order_details.doc
eForm_Order_Details.doc
201901_2226_362_RNG.doc
ORDER_DETAILS_FORM.doc
RNG_012019_7700_832.doc
9436_064_RNG_012019.doc
emotet_e1_12f8564cfb7cb36a6986d9d5995a654613e9340b3eb69c3c027567e8a43d6f7a_2019-01-16__14:50:08.doc
RNG_012019_2738_250.doc
201901_570511_RNG.doc
7682_627_201901_Rechnung.doc
FA074501_0.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!