× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4702be698c3cdf98fa0a04a850da0e4259ca0a314b5594ab3320481211e0acfd
File name: EYRCUD.docm
Detection ratio: 8 / 59
Analysis date: 2017-05-16 09:32:53 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
CAT-QuickHeal O97M.Downloader.AJK 20170516
Ikarus Trojan-Downloader.VBA.Agent 20170516
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20170516
Panda O97M/Downloader 20170515
Qihoo-360 virus.office.obfuscated.1 20170516
Symantec W97M.Downloader 20170515
TrendMicro HEUR_VBA.O2 20170516
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20170516
Ad-Aware 20170516
AegisLab 20170516
AhnLab-V3 20170515
Alibaba 20170516
ALYac 20170516
Antiy-AVL 20170516
Arcabit 20170516
Avast 20170516
AVG 20170515
Avira (no cloud) 20170516
AVware 20170516
Baidu 20170503
BitDefender 20170516
Bkav 20170516
ClamAV 20170515
CMC 20170516
Comodo 20170516
CrowdStrike Falcon (ML) 20170130
Cyren 20170516
DrWeb 20170516
Emsisoft 20170516
Endgame 20170515
ESET-NOD32 20170516
F-Prot 20170516
F-Secure 20170516
Fortinet 20170516
GData 20170516
Sophos ML 20170413
Jiangmin 20170516
K7AntiVirus 20170516
K7GW 20170516
Kaspersky 20170516
Kingsoft 20170516
Malwarebytes 20170516
McAfee 20170516
McAfee-GW-Edition 20170515
Microsoft 20170516
eScan 20170516
nProtect 20170516
Palo Alto Networks (Known Signatures) 20170516
Rising 20170512
SentinelOne (Static ML) 20170330
Sophos AV 20170516
SUPERAntiSpyware 20170516
Symantec Mobile Insight 20170516
Tencent 20170516
TheHacker 20170514
TotalDefense 20170516
TrendMicro-HouseCall 20170516
VBA32 20170516
VIPRE 20170516
ViRobot 20170516
Webroot 20170516
WhiteArmor 20170512
Yandex 20170515
Zillya 20170516
Zoner 20170516
The file being studied follows the Open XML file format! More specifically, it is a Office Open XML Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May perform operations with other files.
May create OLE objects.
May enumerate open windows.
Seems to contain deobfuscation code.
Macros and VBA code streams
[+] ThisDocument.cls word/vbaProject.bin VBA/ThisDocument 80 bytes
[+] STRIX.cls word/vbaProject.bin VBA/STRIX 339 bytes
[+] Module3.bas word/vbaProject.bin VBA/Module3 2154 bytes
enum-windows obfuscated
[+] Module1.bas word/vbaProject.bin VBA/Module1 4124 bytes
exe-pattern obfuscated open-file write-file
[+] Module2.bas word/vbaProject.bin VBA/Module2 3487 bytes
create-ole handle-file obfuscated open-file write-file
Content types
bin
rels
jpg
xml
Package relationships
word/document.xml
docProps/app.xml
docProps/core.xml
Core document properties
dc:creator
1
cp:lastModifiedBy
1
cp:revision
2
dcterms:created
2017-05-16T08:50:00Z
dcterms:modified
2017-05-16T08:50:00Z
cp:contentStatus
Microsoft.XMLHTTPIDEAAdodb.streaMIDEAshell.ApplicationIDEAWscript.shellIDEAProcessIDEAGeTIDEATeMPIDEATypeIDEAopenIDEAwriteIDEAresponseBodyIDEAsavetofileIDEA\\galaperidol.exe
Application document properties
Template
Normal.dotm
TotalTime
0
Pages
2
Words
1
Characters
6
Application
Microsoft Office Word
DocSecurity
0
Lines
1
Paragraphs
1
ScaleCrop
false
vt:lpstr
\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435
vt:i4
1
LinksUpToDate
false
CharactersWithSpaces
6
SharedDoc
false
HyperlinksChanged
false
AppVersion
16.0000
Document languages
Language
Prevalence
ru-ru
3
en-us
1
ar-sa
1
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

ZipFileName
[Content_Types].xml

Template
Normal.dotm

ZipRequiredVersion
20

ModifyDate
2017:05:16 08:50:00Z

ZipCRC
0x199c740e

Words
1

ScaleCrop
No

RevisionNumber
2

MIMEType
application/vnd.ms-word.document.macroEnabled

ZipBitFlag
0x0006

CreateDate
2017:05:16 08:50:00Z

Lines
1

AppVersion
16.0

ZipUncompressedSize
1636

ZipCompressedSize
427

Characters
6

CharactersWithSpaces
6

DocSecurity
None

ZipModifyDate
1980:01:01 00:00:00

FileType
DOCM

Application
Microsoft Office Word

TotalEditTime
0

ZipCompression
Deflated

Pages
2

Creator
1

FileTypeExtension
docm

Paragraphs
1

ContentStatus
Microsoft.XMLHTTPIDEAAdodb.streaMIDEAshell.ApplicationIDEAWscript.shellIDEAProcessIDEAGeTIDEATeMPIDEATypeIDEAopenIDEAwriteIDEAresponseBodyIDEAsavetofileIDEA\galaperidol.exe

The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
123846
Highest datetime
1980-01-01 00:00:00
Lowest datetime
1980-01-01 00:00:00
Contained files by extension
xml
12
bin
1
jpg
1
Contained files by type
XML
16
Microsoft Office
1
JPG
1
File identification
MD5 4d5c8c46d86af3366c32e68bfbd8fe42
SHA1 6332122af42d76c6287787c9caae5b0ac60b3866
SHA256 4702be698c3cdf98fa0a04a850da0e4259ca0a314b5594ab3320481211e0acfd
ssdeep
768:965RtTUiLFtC+cYBF3hSO/xqwYsWrIjzo7Nx3OA12SVY6DiXL4JLEA7NU7C:9CRCiLlxBn0JsyI/onOADVVub4JYA7p

File size 54.1 KB ( 55449 bytes )
File type Office Open XML Document
Magic literal
Zip archive data, at least v2.0 to extract

TrID Word Microsoft Office Open XML Format document (with Macro) (53.0%)
Word Microsoft Office Open XML Format document (23.9%)
Open Packaging Conventions container (17.8%)
ZIP compressed archive (4.0%)
PrintFox/Pagefox bitmap (var. P) (1.0%)
Tags
obfuscated open-file enum-windows exe-pattern handle-file docx macros write-file create-ole

VirusTotal metadata
First submission 2017-05-16 09:32:53 UTC ( 1 year, 7 months ago )
Last submission 2017-05-16 09:32:53 UTC ( 1 year, 7 months ago )
File names EYRCUD.docm
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!