× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 34cc705a6ce097ee31b9b17d9da198c46a4e3d58798585e04815b73cd683f819
File name: Invoice 10013405-04.XLS
Detection ratio: 8 / 55
Analysis date: 2016-01-11 10:34:16 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan 20160111
Avira (no cloud) HEUR/Macro.Downloader 20160111
AVware LooksLike.Macro.Malware.gen!x3 (v) 20160111
F-Secure Trojan:W97M/MaliciousMacro.GEN 20160111
McAfee W97M/Downloader!295FE8083A87 20160111
McAfee-GW-Edition W97M/Downloader!295FE8083A87 20160111
Qihoo-360 heur.macro.download.cc 20160111
VIPRE LooksLike.Macro.Malware.gen!x3 (v) 20160111
Ad-Aware 20160111
AegisLab 20160111
Yandex 20160108
AhnLab-V3 20160111
Alibaba 20160111
ALYac 20160111
Antiy-AVL 20160111
Avast 20160111
AVG 20160111
Baidu-International 20160111
BitDefender 20160111
Bkav 20160109
ByteHero 20160111
CAT-QuickHeal 20160111
ClamAV 20160110
CMC 20160111
Comodo 20160111
Cyren 20160111
DrWeb 20160111
Emsisoft 20160111
ESET-NOD32 20160111
F-Prot 20160111
Fortinet 20160111
GData 20160111
Ikarus 20160111
Jiangmin 20160111
K7AntiVirus 20160111
K7GW 20160111
Kaspersky 20160111
Malwarebytes 20160111
Microsoft 20160111
eScan 20160111
NANO-Antivirus 20160111
nProtect 20160108
Panda 20160110
Rising 20160111
Sophos AV 20160111
SUPERAntiSpyware 20160111
Symantec 20160110
Tencent 20160111
TheHacker 20160107
TrendMicro 20160111
TrendMicro-HouseCall 20160111
VBA32 20160107
ViRobot 20160111
Zillya 20160110
Zoner 20160111
The file being studied follows the Compound Document File format! More specifically, it is a MS Excel Spreadsheet file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May enumerate open windows.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2015-07-30 05:24:02
author
1
last_saved
2016-01-11 07:55:54
application_name
Microsoft Excel
code_page
Cyrillic
Document summary
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020820-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Excel
sid
0
size
13376
type_literal
stream
sid
21
name
\x01CompObj
size
102
type_literal
stream
sid
20
name
\x05DocumentSummaryInformation
size
236
type_literal
stream
sid
19
name
\x05SummaryInformation
size
200
type_literal
stream
sid
1
name
Workbook
size
13350
type_literal
stream
sid
18
name
_VBA_PROJECT_CUR/PROJECT
size
562
type_literal
stream
sid
17
name
_VBA_PROJECT_CUR/PROJECTwm
size
95
type_literal
stream
sid
10
type
macro
name
_VBA_PROJECT_CUR/VBA/MM4
size
33502
type_literal
stream
sid
13
name
_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
size
3562
type_literal
stream
sid
15
name
_VBA_PROJECT_CUR/VBA/__SRP_0
size
1661
type_literal
stream
sid
16
name
_VBA_PROJECT_CUR/VBA/__SRP_1
size
201
type_literal
stream
sid
5
name
_VBA_PROJECT_CUR/VBA/__SRP_2
size
420
type_literal
stream
sid
6
name
_VBA_PROJECT_CUR/VBA/__SRP_3
size
103
type_literal
stream
sid
11
name
_VBA_PROJECT_CUR/VBA/__SRP_4
size
174
type_literal
stream
sid
12
name
_VBA_PROJECT_CUR/VBA/__SRP_5
size
549
type_literal
stream
sid
14
name
_VBA_PROJECT_CUR/VBA/dir
size
586
type_literal
stream
sid
7
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04421
size
976
type_literal
stream
sid
8
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04422
size
976
type_literal
stream
sid
9
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04423
size
976
type_literal
stream
sid
4
type
macro
name
_VBA_PROJECT_CUR/VBA/\u042d\u0442\u0430\u041a\u043d\u0438\u0433\u0430
size
1419
Macros and VBA code streams
[+] MM4.bas _VBA_PROJECT_CUR/VBA/MM4 19990 bytes
exe-pattern create-file create-ole enum-windows obfuscated open-file run-file write-file
ExifTool file metadata
MIMEType
application/vnd.ms-excel

LastModifiedBy
1

CompObjUserType
???? Microsoft Excel 2003

ModifyDate
2016:01:11 07:55:54

TitleOfParts
1, 2, 3

SharedDoc
No

Author
1

FileType
XLS

AppVersion
14.0

LinksUpToDate
No

CodePage
Windows Cyrillic

CompObjUserTypeLen
26

HeadingPairs
, 3

FileTypeExtension
xls

HyperlinksChanged
No

CreateDate
2015:07:30 05:24:02

Security
None

ScaleCrop
No

Software
Microsoft Excel

File identification
MD5 295fe8083a872b9c3edf4439f3a00c67
SHA1 05e2e88eb287cbdb70eae1752f86423db3710a4f
SHA256 34cc705a6ce097ee31b9b17d9da198c46a4e3d58798585e04815b73cd683f819
ssdeep
1536:CYdvxHlcaQPy0iWYOcG4BDhnxDV8ix/7uDphYHceXVhca+fMHLtyeGxclrdgIL3E:CYdvxHlcaAy0iWYOcG4BDhnxDV8ix/7x

File size 65.5 KB ( 67072 bytes )
File type MS Excel Spreadsheet
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Last Saved By: 1, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jul 29 05:24:02 2015, Last Saved Time/Date: Sun Jan 10 07:55:54 2016, Security: 0

TrID Microsoft PowerPoint document (35.5%)
Microsoft Excel sheet (33.8%)
Microsoft Word document (old ver.) (21.4%)
Generic OLE2 / Multistream Compound File (9.0%)
Tags
obfuscated open-file enum-windows exe-pattern create-file run-file macros write-file xls create-ole attachment

VirusTotal metadata
First submission 2016-01-11 10:29:16 UTC ( 1 year, 7 months ago )
Last submission 2016-01-11 10:39:14 UTC ( 1 year, 7 months ago )
File names Invoice 10013405-04.XLS
Invoice 10013405.XLS
9baef359ac60167cddd689c7b41e4349
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!