× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 23e87b6ae0bc972369e9fbceff9f1dcac715ac30da760957d8e30bdbf03b3a3d
Detection ratio: 9 / 58
Analysis date: 2018-04-13 04:08:40 UTC ( 10 months, 2 weeks ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20180413
Fortinet VBA/Agent.HQA!tr.dldr 20180413
Microsoft Trojan:Script/Cloxer.A!cl 20180413
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20180413
nProtect Suspicious/W97M.Obfus.Gen 20180412
Qihoo-360 virus.office.qexvmc.1065 20180413
Symantec W97M.Downloader 20180412
TrendMicro-HouseCall Suspicious_GEN.F47V0412 20180413
Zoner Probably W97Shell 20180412
Ad-Aware 20180413
AegisLab 20180413
AhnLab-V3 20180412
Alibaba 20180413
ALYac 20180413
Antiy-AVL 20180412
Avast 20180413
Avast-Mobile 20180412
AVG 20180413
Avira (no cloud) 20180412
AVware 20180413
Baidu 20180412
BitDefender 20180413
Bkav 20180410
CAT-QuickHeal 20180412
ClamAV 20180412
CMC 20180412
Comodo 20180413
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180413
Cyren 20180413
DrWeb 20180413
eGambit 20180413
Emsisoft 20180413
Endgame 20180403
ESET-NOD32 20180413
F-Prot 20180413
F-Secure 20180413
GData 20180413
Ikarus 20180412
Sophos ML 20180121
Jiangmin 20180413
K7AntiVirus 20180412
K7GW 20180412
Kaspersky 20180413
Kingsoft 20180413
Malwarebytes 20180413
MAX 20180413
McAfee 20180413
McAfee-GW-Edition 20180413
eScan 20180413
Palo Alto Networks (Known Signatures) 20180413
Panda 20180412
Rising 20180413
SentinelOne (Static ML) 20180225
Sophos AV 20180413
SUPERAntiSpyware 20180413
Symantec Mobile Insight 20180412
Tencent 20180413
TheHacker 20180410
TrendMicro 20180413
Trustlook 20180413
VBA32 20180412
VIPRE 20180413
ViRobot 20180413
Webroot 20180413
WhiteArmor 20180408
Yandex 20180412
ZoneAlarm by Check Point 20180413
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-04-12 22:46:00
author
Komusaeno
title
Komusae
page_count
1
last_saved
2018-04-12 22:46:00
revision_number
1
application_name
Microsoft Office Word
character_count
1
template
Normal.dotm
code_page
Latin I
subject
Komusae
Document summary
category
Komusae
line_count
1
company
Komusae
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
6336
type_literal
stream
sid
20
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
328
type_literal
stream
sid
4
name
\x05SummaryInformation
size
420
type_literal
stream
sid
2
name
1Table
size
7952
type_literal
stream
sid
1
name
Data
size
22254
type_literal
stream
sid
18
name
Macros/PROJECT
size
547
type_literal
stream
sid
19
name
Macros/PROJECTwm
size
152
type_literal
stream
sid
17
name
Macros/VBA/_VBA_PROJECT
size
26314
type_literal
stream
sid
9
name
Macros/VBA/__SRP_0
size
1366
type_literal
stream
sid
10
name
Macros/VBA/__SRP_1
size
114
type_literal
stream
sid
11
name
Macros/VBA/__SRP_2
size
292
type_literal
stream
sid
12
name
Macros/VBA/__SRP_3
size
103
type_literal
stream
sid
8
name
Macros/VBA/dir
size
692
type_literal
stream
sid
13
type
macro
name
Macros/VBA/ifKXdnAVGjb
size
23109
type_literal
stream
sid
15
type
macro
name
Macros/VBA/nBHRnrZYbmCf
size
1888
type_literal
stream
sid
16
type
macro
name
Macros/VBA/phbNwVEzjRuQ
size
40139
type_literal
stream
sid
14
type
macro
name
Macros/VBA/uchifGXKqrW
size
8107
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] nBHRnrZYbmCf.cls Macros/VBA/nBHRnrZYbmCf 323 bytes
[+] phbNwVEzjRuQ.bas Macros/VBA/phbNwVEzjRuQ 21013 bytes
[+] ifKXdnAVGjb.bas Macros/VBA/ifKXdnAVGjb 11735 bytes
obfuscated run-file
[+] uchifGXKqrW.bas Macros/VBA/uchifGXKqrW 3874 bytes
ExifTool file metadata
Category
Komusae

SharedDoc
No

Author
Komusaeno

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:04:12 20:46:00

Company
Komusae

Title
Komusae

Characters
1

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

CreateDate
2018:04:12 20:46:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

Warning
Truncated property list

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

Subject
Komusae

File identification
MD5 12d707b1a4011fff49ed4e5751bc98e2
SHA1 0909cb5c6573934f9d109364d7fc82ef6f4129a3
SHA256 23e87b6ae0bc972369e9fbceff9f1dcac715ac30da760957d8e30bdbf03b3a3d
ssdeep
1536:C1UBfa0zx58j6Ik+a9UQFN0y8jIeyZFEVK5NRXian9iI3eYZlppxbSQ4VQnDy:NysrNWQFN0MBT9HOKLpxPnDy

File size 150.0 KB ( 153600 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Komusae, Subject: Komusae, Author: Komusaeno, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Apr 11 21:46:00 2018, Last Saved Time/Date: Wed Apr 11 21:46:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-04-12 21:03:29 UTC ( 10 months, 2 weeks ago )
Last submission 2018-05-12 17:53:41 UTC ( 9 months, 2 weeks ago )
File names Outstanding Invoices.doc
Question.doc
Scan.doc
Fwd: ACH form.doc
Summit Companies Invoice #61835779.doc
Invoice.doc
New order.doc
99.doc
Need to send the attachment.doc
Past Due Invoices.doc
54.doc
79.doc
Paid Invoice.doc
Document needed.doc
Service Report (77116).doc
output.113098458.txt
Open Past Due Orders.doc
Important Please Read.doc
Overdue payment.doc
Past Due Invoice.doc
Service Invoice.doc
Invoices attached.doc
38bbf94dbbb7a23e73fece82c4e7457a92081c1a
Invoice receipt.doc
Sales Invoice.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!