× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4d7c6a2e9e5b963470cae32ce12f47a608c9477ec7d4b07861f639d15ff35a38
File name: Signature Invoice.doc
Detection ratio: 0 / 56
Analysis date: 2014-12-24 09:16:43 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20141224
AegisLab 20141224
Yandex 20141222
AhnLab-V3 20141224
ALYac 20141224
Antiy-AVL 20141224
Avast 20141224
AVG 20141224
Avira (no cloud) 20141224
AVware 20141224
Baidu-International 20141224
BitDefender 20141224
Bkav 20141223
ByteHero 20141224
CAT-QuickHeal 20141224
ClamAV 20141224
CMC 20141218
Comodo 20141224
Cyren 20141224
DrWeb 20141224
Emsisoft 20141224
ESET-NOD32 20141224
F-Prot 20141224
F-Secure 20141224
Fortinet 20141224
GData 20141224
Ikarus 20141224
Jiangmin 20141223
K7AntiVirus 20141223
K7GW 20141224
Kaspersky 20141224
Kingsoft 20141224
Malwarebytes 20141224
McAfee 20141224
McAfee-GW-Edition 20141224
Microsoft 20141224
eScan 20141224
NANO-Antivirus 20141223
Norman 20141224
nProtect 20141224
Panda 20141223
Qihoo-360 20141224
Rising 20141224
Sophos 20141224
SUPERAntiSpyware 20141224
Symantec 20141224
Tencent 20141224
TheHacker 20141222
TotalDefense 20141223
TrendMicro 20141224
TrendMicro-HouseCall 20141224
VBA32 20141223
VIPRE 20141224
ViRobot 20141224
Zillya 20141223
Zoner 20141223
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
Automatically runs commands or instructions when the file is opened.
May read system environment variables.
May open a file.
May create OLE objects.
May execute code from Dynamically Linked Libraries.
May try to download additional files from the Internet.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2014-12-08 21:39:00
template
Normal.dot
author
1
page_count
1
last_saved
2014-12-08 21:45:00
edit_time
300
revision_number
7
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
line_count
1
version
730895
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4672
type_literal
stream
size
113
name
\x01CompObj
sid
12
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
4096
name
1Table
sid
1
type_literal
stream
size
444
name
Macros/PROJECT
sid
11
type_literal
stream
size
41
name
Macros/PROJECTwm
sid
10
type_literal
stream
size
12604
type
macro
name
Macros/VBA/ThisDocument
sid
7
type_literal
stream
size
3413
name
Macros/VBA/_VBA_PROJECT
sid
8
type_literal
stream
size
514
name
Macros/VBA/dir
sid
9
type_literal
stream
size
4142
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 5253 bytes
auto-open create-ole download environ obfuscated open-file run-dll
ExifTool file metadata
SharedDoc
No

Author
1

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal.dot

CharCountWithSpaces
0

CreateDate
2014:12:08 20:39:00

CompObjUserType
???????? Microsoft Office Word

ModifyDate
2014:12:08 20:45:00

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
7

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
11.9999

Security
None

Software
Microsoft Office Word

TotalEditTime
5.0 minutes

Pages
1

CompObjUserTypeLen
31

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 38368ef451cbe4120f427e4b79405c6c
SHA1 78794c541247404e1348218b3a5bc8e867a9bc0d
SHA256 4d7c6a2e9e5b963470cae32ce12f47a608c9477ec7d4b07861f639d15ff35a38
ssdeep
192:69W/4rXDSYNW1AoNm3MLQ9GDPDs63flioI7kZ0j82222stqUlclAat:68sXDST1AoNpllilgZ0j8oxtqaclf

File size 37.5 KB ( 38400 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: 1, Template: Normal.dot, Last Saved By: 1, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 05:00, Create Time/Date: Sun Dec 07 20:39:00 2014, Last Saved Time/Date: Sun Dec 07 20:45:00 2014, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (45.7%)
Microsoft Excel sheet (42.8%)
Generic OLE2 / Multistream Compound File (11.4%)
Tags
obfuscated open-file auto-open doc macros run-dll environ attachment download create-ole

VirusTotal metadata
First submission 2014-12-24 08:18:13 UTC ( 2 years, 5 months ago )
Last submission 2016-07-21 10:21:51 UTC ( 10 months ago )
File names Signature Invoice.doc
64bcfe3980f8d94055dd406c3f45c139
Signature Invoice.doc.dat
996d1df3f43c6e16722be0a63d9c443c
VirusShare_38368ef451cbe4120f427e4b79405c6c
7f45af2f090ab6de1eb96af5647192e5
556ecacb572a569e2c8c9fb17259fcf2
5c3d2dae84cf51235367ee14d768da82
4d7c6a2e9e5b963470cae32ce12f47a608c9477ec7d4b07861f639d15ff35a38 (1).bin
a802e30c8b8155fef844488992b1b589
119704472605-5-0_attach.1.Signature Invoice.doc
565b1718e5812e908b840879cce57393
5b88b3c5fd6f0a87fe337ef2e9d3dd5e
4d7c6a2e9e5b963470cae32ce12f47a608c9477ec7d4b07861f639d15ff35a38.bin
38368ef451cbe4120f427e4b79405c6c.malware
image001.doc
b00b6aa20be0bd3a9719fbe930fd0fea
Signature Invoice.doc
Signature Invoice.doc
Signature_Invoice.doc
Signature Invoice.vdoc
d9445941f02349107730cba48fe455aa
Signature Invoice.doc
c1d64ce12e92c178d72510d0c2ff8e22
05621184f73d8616429262d106075c21
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!