× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cc6db28c4ed67d98e5685e0e83882c04d1da0ee7c0f587166ba5c9dc9479c72
File name: 726-09-749595-081 & 726-09-749595-767.doc
Detection ratio: 41 / 61
Analysis date: 2018-09-12 12:05:18 UTC ( 6 days, 14 hours ago )
Antivirus Result Update
Ad-Aware VB.EmoDldr.3.Gen 20180912
AegisLab Troj.Frs.Vsn0Ad18!c 20180912
AhnLab-V3 W97M/Downloader 20180912
ALYac VB.EmoDldr.3.Gen 20180912
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.hpj 20180912
Arcabit HEUR.VBA.Trojan.e 20180912
Avast Other:Malware-gen [Trj] 20180912
AVG Other:Malware-gen [Trj] 20180912
Baidu VBA.Trojan-Downloader.Agent.cpw 20180912
BitDefender VB.EmoDldr.3.Gen 20180912
ClamAV Doc.Dropper.Agent-6501723-0 20180912
Comodo UnclassifiedMalware 20180912
Cyren Trojan.AJED-71 20180912
DrWeb W97M.Siggen.465 20180912
Emsisoft VB.EmoDldr.3.Gen (B) 20180912
Endgame malicious (high confidence) 20180730
ESET-NOD32 VBA/TrojanDownloader.Agent.HPJ 20180912
F-Prot New or modified W97M/Donoff 20180912
F-Secure VB.EmoDldr.3.Gen 20180912
Fortinet VBA/Agent.HQO!tr.dldr 20180912
GData VB.EmoDldr.3.Gen 20180912
Ikarus Trojan.VBA.Agent 20180912
K7AntiVirus Trojan ( 00536d111 ) 20180912
K7GW Trojan ( 00536d111 ) 20180912
Kaspersky HEUR:Trojan.Script.Agent.gen 20180912
McAfee RDN/Generic Downloader.x 20180912
McAfee-GW-Edition BehavesLike.Downloader.cl 20180912
Microsoft TrojanDownloader:O97M/Donoff 20180912
eScan VB.EmoDldr.3.Gen 20180912
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20180912
Qihoo-360 virus.office.obfuscated.1 20180912
Rising Downloader.Donoff!8.36C (TOPIS:xxHtHmFZAyD) 20180912
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Troj/DocDl-NIR 20180912
Symantec W97M.Downloader 20180912
TACHYON Trojan/W97M.Agent.Gen 20180912
Tencent Heur.Macro.Generic.Gen.h 20180912
TrendMicro W2KM_DONOFF.THDAIAH 20180912
TrendMicro-HouseCall W2KM_DONOFF.THDAIAH 20180912
ZoneAlarm by Check Point HEUR:Trojan.Script.Agent.gen 20180912
Zoner Probably W97Obfuscated 20180912
Alibaba 20180713
Avast-Mobile 20180912
Avira (no cloud) 20180912
AVware 20180912
Babable 20180907
Bkav 20180912
CAT-QuickHeal 20180909
CMC 20180912
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180912
eGambit 20180912
Sophos ML 20180717
Jiangmin 20180912
Kingsoft 20180912
Malwarebytes 20180912
MAX 20180912
Palo Alto Networks (Known Signatures) 20180912
Panda 20180911
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TheHacker 20180907
TotalDefense 20180912
Trustlook 20180912
VBA32 20180912
VIPRE 20180912
ViRobot 20180912
Webroot 20180912
Yandex 20180910
Zillya 20180911
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-04-10 15:43:00
author
Vorilope
title
Tenaefamo
page_count
1
last_saved
2018-04-10 15:43:00
revision_number
1
application_name
Microsoft Office Word
character_count
1
template
Normal.dotm
code_page
Latin I
subject
Tenaefamo
Document summary
category
Tenaefa
line_count
1
company
Tenaefamo
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
5440
type_literal
stream
sid
20
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
332
type_literal
stream
sid
4
name
\x05SummaryInformation
size
428
type_literal
stream
sid
2
name
1Table
size
7908
type_literal
stream
sid
1
name
Data
size
22917
type_literal
stream
sid
18
name
Macros/PROJECT
size
541
type_literal
stream
sid
19
name
Macros/PROJECTwm
size
140
type_literal
stream
sid
14
type
macro
name
Macros/VBA/LCPEjNuVu
size
47068
type_literal
stream
sid
16
type
macro
name
Macros/VBA/SoqJMuRNCCZdO
size
34639
type_literal
stream
sid
17
type
macro (only attributes)
name
Macros/VBA/ZwRYFzaoqYOBE
size
1112
type_literal
stream
sid
15
name
Macros/VBA/_VBA_PROJECT
size
32691
type_literal
stream
sid
10
name
Macros/VBA/__SRP_0
size
1342
type_literal
stream
sid
11
name
Macros/VBA/__SRP_1
size
114
type_literal
stream
sid
12
name
Macros/VBA/__SRP_2
size
220
type_literal
stream
sid
13
name
Macros/VBA/__SRP_3
size
66
type_literal
stream
sid
8
name
Macros/VBA/dir
size
689
type_literal
stream
sid
9
type
macro
name
Macros/VBA/jNiFXTP
size
11099
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] LCPEjNuVu.bas Macros/VBA/LCPEjNuVu 26628 bytes
[+] SoqJMuRNCCZdO.bas Macros/VBA/SoqJMuRNCCZdO 19487 bytes
create-ole obfuscated run-file
[+] jNiFXTP.bas Macros/VBA/jNiFXTP 5920 bytes
ExifTool file metadata
Category
Tenaefa

SharedDoc
No

Author
Vorilope

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:04:10 14:43:00

Company
Tenaefamo

Title
Tenaefamo

Characters
1

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

CreateDate
2018:04:10 14:43:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

Warning
Truncated property list

FileTypeExtension
doc

Paragraphs
1

DocFlags
Has picture, 1Table, ExtChar

Subject
Tenaefamo

File identification
MD5 469549b3db732a5e9e837ab779b66385
SHA1 3a9623cf88a5bd3b937842aaeaf4543bb01d6ee1
SHA256 3cc6db28c4ed67d98e5685e0e83882c04d1da0ee7c0f587166ba5c9dc9479c72
ssdeep
3072:zsmVq5X4wq159XKdt3D8wHG2pLclAiKpUHvtDa3gi:zsx14wq159QtTRHG2pLcaiKkvtu3b

File size 176.0 KB ( 180224 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Tenaefamo, Subject: Tenaefamo, Author: Vorilope, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Apr 09 14:43:00 2018, Last Saved Time/Date: Mon Apr 09 14:43:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc create-ole

VirusTotal metadata
First submission 2018-04-10 18:30:39 UTC ( 5 months, 1 week ago )
Last submission 2018-04-11 12:52:18 UTC ( 5 months, 1 week ago )
File names Outstanding Invoices.doc
4 Past Due Invoices.doc
Question.doc
Paid Invoices.doc
2018.doc
2018.doc
2018.doc
Fwd: ACH form.doc
726-09-749595-081 & 726-09-749595-767.doc
75.doc
Invoice 8564780 April.doc
Past Due Invoices.doc
ACH form.doc
Overdue payment.doc
Paid Invoice & Credit Card Receipt.doc
Open Past Due Orders.doc
Question.doc
2018.doc
Past Due Invoice.doc
Open invoices.doc
Service Invoice.doc
Invoices attached.doc
Invoice receipt.doc
500-78-095380-604 & 500-78-095380-576.doc
Sales Invoice.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!