× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7af1f7a16f09716615b2d6de7da9f741a69dd9d9709284b83ca177972ab7a7e7
File name: (INV)UQE83544493675.doc
Detection ratio: 14 / 58
Analysis date: 2018-07-24 08:01:18 UTC ( 10 months, 1 week ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20180724
Baidu VBA.Trojan-Downloader.Agent.ddo 20180724
Fortinet VBA/Agent.C313!tr.dldr 20180724
K7AntiVirus Trojan ( 00536d111 ) 20180724
K7GW Trojan ( 00536d111 ) 20180724
McAfee Downloader-FBSP!4E46B757D175 20180724
McAfee-GW-Edition BehavesLike.Downloader.cg 20180724
Microsoft TrojanDownloader:O97M/Donoff 20180724
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20180724
Qihoo-360 virus.office.qexvmc.1075 20180724
Symantec ISB.Downloader!gen69 20180724
TACHYON Suspicious/W97M.Obfus.Gen 20180724
Tencent Heur.Macro.Generic.Gen.f 20180724
Zoner Probably W97Obfuscated 20180723
Ad-Aware 20180724
AegisLab 20180724
AhnLab-V3 20180723
Alibaba 20180713
ALYac 20180724
Antiy-AVL 20180724
Avast 20180724
Avast-Mobile 20180723
AVG 20180724
Avira (no cloud) 20180724
AVware 20180724
Babable 20180406
BitDefender 20180724
Bkav 20180723
CAT-QuickHeal 20180723
ClamAV 20180724
CMC 20180724
Comodo 20180724
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180724
Cyren 20180724
DrWeb 20180724
eGambit 20180724
Emsisoft 20180724
Endgame 20180711
ESET-NOD32 20180724
F-Prot 20180724
F-Secure 20180724
GData 20180724
Ikarus 20180723
Sophos ML 20180717
Jiangmin 20180724
Kaspersky 20180724
Kingsoft 20180724
Malwarebytes 20180724
MAX 20180724
eScan 20180724
Palo Alto Networks (Known Signatures) 20180724
Panda 20180723
Rising 20180724
SentinelOne (Static ML) 20180701
Sophos AV 20180724
SUPERAntiSpyware 20180724
TheHacker 20180723
TrendMicro 20180724
TrendMicro-HouseCall 20180724
Trustlook 20180724
VBA32 20180723
VIPRE 20180724
ViRobot 20180724
Webroot 20180724
Yandex 20180720
ZoneAlarm by Check Point 20180724
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-07-24 08:21:00
revision_number
1
author
Ihikodaem-PC
page_count
1
last_saved
2018-07-24 08:21:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
1
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4736
type_literal
stream
sid
18
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
416
type_literal
stream
sid
2
name
1Table
size
9612
type_literal
stream
sid
1
name
Data
size
42348
type_literal
stream
sid
16
name
Macros/PROJECT
size
444
type_literal
stream
sid
17
name
Macros/PROJECTwm
size
77
type_literal
stream
sid
14
name
Macros/VBA/_VBA_PROJECT
size
28212
type_literal
stream
sid
9
name
Macros/VBA/__SRP_0
size
1471
type_literal
stream
sid
10
name
Macros/VBA/__SRP_1
size
106
type_literal
stream
sid
11
name
Macros/VBA/__SRP_2
size
880
type_literal
stream
sid
12
name
Macros/VBA/__SRP_3
size
439
type_literal
stream
sid
8
name
Macros/VBA/dir
size
584
type_literal
stream
sid
13
type
macro
name
Macros/VBA/jYzMtfRzD
size
18367
type_literal
stream
sid
15
type
macro
name
Macros/VBA/jjrzAnWBkJEZpQ
size
34797
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] jYzMtfRzD.cls Macros/VBA/jYzMtfRzD 9604 bytes
obfuscated run-file
[+] jjrzAnWBkJEZpQ.bas Macros/VBA/jjrzAnWBkJEZpQ 19655 bytes
obfuscated
ExifTool file metadata
SharedDoc
No

Author
Ihikodaem-PC

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

CreateDate
2018:07:24 07:21:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:07:24 07:21:00

Characters
1

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 4e46b757d1756c9b54bb740da2ea5f7b
SHA1 62cf3679ff76a6e23eaa2430aa4c26ffce90520b
SHA256 7af1f7a16f09716615b2d6de7da9f741a69dd9d9709284b83ca177972ab7a7e7
ssdeep
3072:MxjnB29gb8onLuCDMbvFuVOZMNkTdjMzlDqFu:MxyUuCD+vFuVvuTd7Fu

File size 155.0 KB ( 158720 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Ihikodaem-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Jul 23 07:21:00 2018, Last Saved Time/Date: Mon Jul 23 07:21:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-07-24 08:01:12 UTC ( 10 months, 1 week ago )
Last submission 2018-07-24 08:01:18 UTC ( 10 months, 1 week ago )
File names Rech-YRI039221632059.doc
Rechnungszahlung-BIC9809818.doc
Rechnungs-Details-CCB159160437575.doc
(INV)VOU256748203.doc
(INV)AS784143100002.doc
Zahlungsschreiben-LHF320692612588754.doc
(INV)UQE83544493675.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!