× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cc55be9cf8e30726a17230e18821184ff3e1c9ef57758bd4b2dfe6c3e7e1966
File name: Suncorp-payment-3333.doc
Detection ratio: 4 / 53
Analysis date: 2016-12-06 20:49:49 UTC ( 2 years, 1 month ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20161206
AVware LooksLike.Macro.Malware.k (v) 20161206
Rising Macro.Agent.dx (classic) 20161206
VIPRE LooksLike.Macro.Malware.k (v) 20161206
Ad-Aware 20161206
AegisLab 20161206
AhnLab-V3 20161206
Alibaba 20161206
ALYac 20161206
Antiy-AVL 20161206
Avast 20161206
AVG 20161206
Avira (no cloud) 20161206
Baidu 20161206
BitDefender 20161206
Bkav 20161206
CAT-QuickHeal 20161206
ClamAV 20161206
CMC 20161206
Comodo 20161205
CrowdStrike Falcon (ML) 20161024
Cyren 20161206
DrWeb 20161206
Emsisoft 20161206
ESET-NOD32 20161206
F-Prot 20161206
F-Secure 20161206
Fortinet 20161206
GData 20161206
Ikarus 20161206
Sophos ML 20161202
Jiangmin 20161206
K7AntiVirus 20161206
K7GW 20161206
Kaspersky 20161206
Kingsoft 20161206
Malwarebytes 20161206
McAfee 20161205
McAfee-GW-Edition 20161206
Microsoft 20161206
eScan 20161206
NANO-Antivirus 20161206
nProtect 20161206
Panda 20161206
Qihoo-360 20161206
Sophos AV 20161206
SUPERAntiSpyware 20161206
Symantec 20161206
Tencent 20161206
TheHacker 20161130
TrendMicro-HouseCall 20161206
Trustlook 20161206
VBA32 20161206
ViRobot 20161206
WhiteArmor 20161125
Yandex 20161206
Zillya 20161205
Zoner 20161206
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
user
creation_datetime
2016-12-06 18:16:00
author
Filbells
title
page_count
1
last_saved
2016-12-06 18:18:00
edit_time
120
revision_number
3
application_name
Microsoft Office Word
character_count
2
code_page
Cyrillic
template
Normal
Document summary
byte_count
11000
company
characters_with_spaces
2
line_count
1
version
786432
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
11520
type_literal
stream
size
121
name
\x01CompObj
sid
21
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
6794
name
1Table
sid
2
type_literal
stream
size
23225
name
Data
sid
1
type_literal
stream
size
654
name
Macros/PROJECT
sid
20
type_literal
stream
size
119
name
Macros/PROJECTwm
sid
19
type_literal
stream
size
1581
type
macro
name
Macros/VBA/Module1
sid
11
type_literal
stream
size
1097
type
macro
name
Macros/VBA/ThisDocument
sid
8
type_literal
stream
size
3502
name
Macros/VBA/_VBA_PROJECT
sid
12
type_literal
stream
size
1076
type
macro
name
Macros/VBA/analyticity
sid
9
type_literal
stream
size
897
name
Macros/VBA/dir
sid
13
type_literal
stream
size
1155
type
macro (only attributes)
name
Macros/VBA/form1
sid
10
type_literal
stream
size
97
name
Macros/form1/\x01CompObj
sid
17
type_literal
stream
size
288
name
Macros/form1/\x03VBFrame
sid
18
type_literal
stream
size
515
name
Macros/form1/f
sid
15
type_literal
stream
size
16112
name
Macros/form1/o
sid
16
type_literal
stream
size
73527
name
WordDocument
sid
3
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 29 bytes
[+] analyticity.bas Macros/VBA/analyticity 134 bytes
[+] Module1.bas Macros/VBA/Module1 416 bytes
run-file
ExifTool file metadata
SharedDoc
No

Author
Filbells

HyperlinksChanged
No

LinksUpToDate
No

LastModifiedBy
user

HeadingPairs
Title, 1, Title , 1

Template
Normal

CharCountWithSpaces
2

CreateDate
2016:12:06 17:16:00

CompObjUserType
Microsoft Office Word 97-2003 Document

ModifyDate
2016:12:06 17:18:00

TitleOfParts
,

Characters
2

CodePage
Windows Cyrillic

RevisionNumber
3

MIMEType
application/msword

Words
0

Lines
1

FileType
DOC

Bytes
11000

AppVersion
12.0

Security
None

Software
Microsoft Office Word

TotalEditTime
2.0 minutes

Pages
1

ScaleCrop
No

CompObjUserTypeLen
39

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 cd79797fba0a75c16bf9eaa38ad3a3a3
SHA1 9982a7a90ca09044ae27843327998bf6d366ce30
SHA256 3cc55be9cf8e30726a17230e18821184ff3e1c9ef57758bd4b2dfe6c3e7e1966
ssdeep
3072:N6gG6gHlMBg9swQVDkN1/tYibZAd88+EXl05A5KvJkH:wqBCKi9tYqZAdXG5A5KvJkH

File size 143.5 KB ( 146944 bytes )
File type MS Word Document
Magic literal
Windows, Version 5.1, Code page: 1251, Title: , Author: Filbells, Template: Normal, Last Saved By: user, Revision Number: 3, Name of Creating Application: Microsoft Office Word, Total Editing Time: 02:00, Create Time/Date: Mon Dec 05 17:16:00 2016, Last Saved Time/Date: Mon Dec 05 17:18:00 2016, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0

TrID Microsoft Word document (80.0%)
Generic OLE2 / Multistream Compound File (20.0%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2016-12-06 18:37:02 UTC ( 2 years, 1 month ago )
Last submission 2016-12-21 12:46:54 UTC ( 2 years, 1 month ago )
File names ANZ-payment-1111.doc
ANZ-message29722.doc
Suncorp-payment-9999.doc
Suncorp-payment-3333.doc
Nab-payment-5555.doc
Suncorp-payment-4444.doc
Nab-payment-2222.doc
ANZ-message57983.doc
Suncorp-payment-6666.doc
ANZ-payment-9999.doc
Westpac-payment-1111.doc
Suncorp-payment-5555.doc
9982a7a90ca09044ae27843327998bf6d366ce30.doc
Suncorp-payment-0000.doc
ANZ-payment-7777.doc
Westpac-payment-9999.doc
ANZ-message47829.doc
ANZ-message08884.doc
Commbank-payment-6666.doc
ANZ-payment-8888.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!