× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5b331913deba1ae1d86dac79ec8b5fecb77b4a7087bcbacde204a124693fec58
File name: Invoice 10013405-05.XLS
Detection ratio: 8 / 55
Analysis date: 2016-01-11 10:34:23 UTC ( 1 year, 5 months ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan 20160111
Avira (no cloud) HEUR/Macro.Downloader 20160111
AVware LooksLike.Macro.Malware.gen!x3 (v) 20160111
F-Secure Trojan:W97M/MaliciousMacro.GEN 20160111
McAfee W97M/Downloader!9440167E4955 20160111
McAfee-GW-Edition W97M/Downloader!9440167E4955 20160111
Qihoo-360 heur.macro.download.cc 20160111
VIPRE LooksLike.Macro.Malware.gen!x3 (v) 20160111
Ad-Aware 20160111
AegisLab 20160111
Yandex 20160108
AhnLab-V3 20160111
Alibaba 20160111
ALYac 20160111
Antiy-AVL 20160111
Avast 20160111
AVG 20160111
Baidu-International 20160111
BitDefender 20160111
Bkav 20160109
ByteHero 20160111
CAT-QuickHeal 20160111
ClamAV 20160110
CMC 20160111
Comodo 20160111
Cyren 20160111
DrWeb 20160111
Emsisoft 20160111
ESET-NOD32 20160111
F-Prot 20160111
Fortinet 20160111
GData 20160111
Ikarus 20160111
Jiangmin 20160111
K7AntiVirus 20160111
K7GW 20160111
Kaspersky 20160111
Malwarebytes 20160111
Microsoft 20160111
eScan 20160111
NANO-Antivirus 20160111
nProtect 20160108
Panda 20160110
Rising 20160111
Sophos 20160111
SUPERAntiSpyware 20160111
Symantec 20160110
Tencent 20160111
TheHacker 20160107
TrendMicro 20160111
TrendMicro-HouseCall 20160111
VBA32 20160107
ViRobot 20160111
Zillya 20160110
Zoner 20160111
The file being studied follows the Compound Document File format! More specifically, it is a MS Excel Spreadsheet file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May enumerate open windows.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2015-07-30 06:24:02
author
1
last_saved
2016-01-11 08:55:42
application_name
Microsoft Excel
code_page
Cyrillic
Document summary
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020820-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Excel
sid
0
size
13376
type_literal
stream
size
102
name
\x01CompObj
sid
21
type_literal
stream
size
236
name
\x05DocumentSummaryInformation
sid
20
type_literal
stream
size
200
name
\x05SummaryInformation
sid
19
type_literal
stream
size
13350
name
Workbook
sid
1
type_literal
stream
size
562
name
_VBA_PROJECT_CUR/PROJECT
sid
18
type_literal
stream
size
95
name
_VBA_PROJECT_CUR/PROJECTwm
sid
17
type_literal
stream
size
33502
type
macro
name
_VBA_PROJECT_CUR/VBA/MM4
sid
10
type_literal
stream
size
3562
name
_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
sid
13
type_literal
stream
size
1661
name
_VBA_PROJECT_CUR/VBA/__SRP_0
sid
15
type_literal
stream
size
201
name
_VBA_PROJECT_CUR/VBA/__SRP_1
sid
16
type_literal
stream
size
420
name
_VBA_PROJECT_CUR/VBA/__SRP_2
sid
5
type_literal
stream
size
103
name
_VBA_PROJECT_CUR/VBA/__SRP_3
sid
6
type_literal
stream
size
174
name
_VBA_PROJECT_CUR/VBA/__SRP_4
sid
11
type_literal
stream
size
549
name
_VBA_PROJECT_CUR/VBA/__SRP_5
sid
12
type_literal
stream
size
586
name
_VBA_PROJECT_CUR/VBA/dir
sid
14
type_literal
stream
size
976
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04421
sid
7
type_literal
stream
size
976
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04422
sid
8
type_literal
stream
size
976
type
macro (only attributes)
name
_VBA_PROJECT_CUR/VBA/\u041b\u0438\u0441\u04423
sid
9
type_literal
stream
size
1419
type
macro
name
_VBA_PROJECT_CUR/VBA/\u042d\u0442\u0430\u041a\u043d\u0438\u0433\u0430
sid
4
Macros and VBA code streams
[+] MM4.bas _VBA_PROJECT_CUR/VBA/MM4 19990 bytes
exe-pattern create-file create-ole enum-windows obfuscated open-file run-file write-file
ExifTool file metadata
MIMEType
application/vnd.ms-excel

CompObjUserTypeLen
26

CompObjUserType
???? Microsoft Excel 2003

ModifyDate
2016:01:11 07:55:42

TitleOfParts
1, 2, 3

SharedDoc
No

Author
1

FileType
XLS

AppVersion
14.0

LinksUpToDate
No

ScaleCrop
No

LastModifiedBy
1

HeadingPairs
, 3

FileTypeExtension
xls

HyperlinksChanged
No

CreateDate
2015:07:30 05:24:02

Security
None

CodePage
Windows Cyrillic

Software
Microsoft Excel

File identification
MD5 9440167e49553f2a1d8aa1e38752e497
SHA1 a7b3bae16b2767b7189d46e3e0a55b132f881a7b
SHA256 5b331913deba1ae1d86dac79ec8b5fecb77b4a7087bcbacde204a124693fec58
ssdeep
1536:ZYdvxHlcaQPy0iWYOcG4BDhnxDV8ix/7uDphYHceXVhca+fMHLtyeGxclrdgIL3E:ZYdvxHlcaAy0iWYOcG4BDhnxDV8ix/7x

File size 65.5 KB ( 67072 bytes )
File type MS Excel Spreadsheet
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Last Saved By: 1, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jul 29 05:24:02 2015, Last Saved Time/Date: Sun Jan 10 07:55:42 2016, Security: 0

TrID Microsoft PowerPoint document (35.5%)
Microsoft Excel sheet (33.8%)
Microsoft Word document (old ver.) (21.4%)
Generic OLE2 / Multistream Compound File (9.0%)
Tags
obfuscated open-file enum-windows exe-pattern create-file run-file macros write-file xls create-ole

VirusTotal metadata
First submission 2016-01-11 10:01:49 UTC ( 1 year, 5 months ago )
Last submission 2016-01-11 10:39:06 UTC ( 1 year, 5 months ago )
File names 59c02c76216dea757de781c2bc57ea43
13a64eb5231a05d813bed99c1f675228
Invoice 10013405-05.XLS
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!