× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8ac7c762c5722878f671c4e69b27780728e12b4393c350362d3283e99bb1e504
File name: output.113042125.txt
Detection ratio: 34 / 60
Analysis date: 2018-04-10 02:01:23 UTC ( 1 year ago ) View latest
Antivirus Result Update
Ad-Aware VB:Trojan.Valyria.1507 20180410
AegisLab Troj.Script.Agent!c 20180409
ALYac Trojan.Downloader.VBA.gen 20180410
Arcabit HEUR.VBA.Trojan.e 20180409
Avast Other:Malware-gen [Trj] 20180409
AVG Other:Malware-gen [Trj] 20180409
Avira (no cloud) W97M/Agent.0443515 20180409
Baidu VBA.Trojan-Downloader.Agent.cpw 20180409
BitDefender VB:Trojan.Valyria.1507 20180409
ClamAV Doc.Dropper.Agent-6488222-0 20180409
Cyren Trojan.PXCM-7 20180409
Emsisoft VB:Trojan.Valyria.1507 (B) 20180409
ESET-NOD32 VBA/TrojanDownloader.Agent.HMK 20180409
F-Secure VB:Trojan.Valyria.1507 20180409
Fortinet VBA/Agent.HHV!tr 20180409
GData VB:Trojan.Valyria.1507 20180409
Ikarus Trojan-Downloader.VBA.Agent 20180409
K7AntiVirus Trojan ( 0001140e1 ) 20180409
K7GW Trojan ( 0001140e1 ) 20180409
Kaspersky HEUR:Trojan.Script.Agent.gen 20180409
McAfee RDN/Generic Downloader.x 20180409
McAfee-GW-Edition W97M/Downloader.cnu 20180409
Microsoft Trojan:Win32/Occamy.A 20180409
eScan VB:Trojan.Valyria.1507 20180409
nProtect Trojan/W97M.Agent.Gen 20180409
Qihoo-360 virus.office.qexvmc.1075 20180410
Sophos AV Troj/DocDl-MZT 20180409
Symantec Trojan.Gen.NPE.2 20180409
Tencent Win32.Trojan-downloader.Agent.Lqoy 20180410
TrendMicro W2KM_POWLOAD.UHAOEDI 20180409
TrendMicro-HouseCall W2KM_POWLOAD.UHAOEDI 20180409
ViRobot DOC.Z.Agent.166912.CG 20180409
ZoneAlarm by Check Point HEUR:Trojan.Script.Agent.gen 20180410
Zoner Probably W97Obfuscated 20180410
AhnLab-V3 20180409
Alibaba 20180409
Antiy-AVL 20180409
Avast-Mobile 20180409
AVware 20180409
Bkav 20180409
CAT-QuickHeal 20180409
CMC 20180409
Comodo 20180409
CrowdStrike Falcon (ML) 20170201
Cybereason 20180225
Cylance 20180410
DrWeb 20180409
eGambit 20180410
Endgame 20180402
F-Prot 20180409
Sophos ML 20180120
Jiangmin 20180409
Kingsoft 20180410
Malwarebytes 20180409
MAX 20180410
NANO-Antivirus 20180409
Palo Alto Networks (Known Signatures) 20180410
Panda 20180409
Rising 20180409
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180409
Symantec Mobile Insight 20180406
TheHacker 20180404
TotalDefense 20180409
Trustlook 20180410
VBA32 20180409
VIPRE 20180409
Webroot 20180410
WhiteArmor 20180408
Yandex 20180408
Zillya 20180409
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-03-29 06:45:00
author
Tuwizha
title
Tuwizha
page_count
1
last_saved
2018-03-29 06:45:00
revision_number
1
application_name
Microsoft Office Word
character_count
1
subject
Tuwizha
code_page
Latin I
template
Normal.dotm
Document summary
category
Tuwizhazhu
line_count
1
company
Tuwizha
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
5440
type_literal
stream
size
114
name
\x01CompObj
sid
20
type_literal
stream
size
332
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
416
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7798
name
1Table
sid
2
type_literal
stream
size
21597
name
Data
sid
1
type_literal
stream
size
553
name
Macros/PROJECT
sid
18
type_literal
stream
size
146
name
Macros/PROJECTwm
sid
19
type_literal
stream
size
36592
type
macro
name
Macros/VBA/CVCTZlPOIPsP
sid
15
type_literal
stream
size
8857
type
macro
name
Macros/VBA/KwTYwukDAzoHcs
sid
17
type_literal
stream
size
23678
type
macro
name
Macros/VBA/NrpCNsM
sid
9
type_literal
stream
size
43298
name
Macros/VBA/_VBA_PROJECT
sid
16
type_literal
stream
size
1344
name
Macros/VBA/__SRP_0
sid
10
type_literal
stream
size
114
name
Macros/VBA/__SRP_1
sid
11
type_literal
stream
size
220
name
Macros/VBA/__SRP_2
sid
12
type_literal
stream
size
66
name
Macros/VBA/__SRP_3
sid
13
type_literal
stream
size
692
name
Macros/VBA/dir
sid
8
type_literal
stream
size
1109
type
macro (only attributes)
name
Macros/VBA/qCTwzlDzGvu
sid
14
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] CVCTZlPOIPsP.bas Macros/VBA/CVCTZlPOIPsP 20169 bytes
[+] NrpCNsM.bas Macros/VBA/NrpCNsM 12669 bytes
create-ole obfuscated run-file
[+] KwTYwukDAzoHcs.bas Macros/VBA/KwTYwukDAzoHcs 4501 bytes
ExifTool file metadata
Category
Tuwizhazhu

SharedDoc
No

Author
Tuwizha

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:03:29 04:45:00

ScaleCrop
No

Company
Tuwizha

Title
Tuwizha

Characters
1

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

CreateDate
2018:03:29 04:45:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

Warning
Truncated property list

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

Subject
Tuwizha

File identification
MD5 abdca7fb2654545d2cc8ba858b5c0273
SHA1 dc493f05c845c967c05feefffa881390a8568b2c
SHA256 8ac7c762c5722878f671c4e69b27780728e12b4393c350362d3283e99bb1e504
ssdeep
1536:0/yhKYdGoZ+a916PwO7zrtC9hCMyp7lS4Zcwin7aP6sXA3FSbgYGG9RN4RwBv:eyhKYIox6P1rwhCpp621syZGauRw1

File size 163.0 KB ( 166912 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Tuwizha, Subject: Tuwizha, Author: Tuwizha, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Mar 28 05:45:00 2018, Last Saved Time/Date: Wed Mar 28 05:45:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc create-ole

VirusTotal metadata
First submission 2018-03-29 09:11:33 UTC ( 1 year ago )
Last submission 2018-05-26 02:32:02 UTC ( 11 months ago )
File names DS-7854079865253.doc
EF-10304347106.doc
a3d820e43e4a39a692a1753ce139f5d486cdcd4e
TEU-141995760875.doc
TP-4904957408852.doc
BYT-539648089466600.doc
TZR-7615053.doc
VY-9581540409.doc
MP-25909601735.doc
MTX-104322265.doc
QOP-36769663.doc
HLM-1994299726407.doc
WBF-742365412.doc
EIS-9111136057407.doc
SG-2618441.doc
CSI-349908462.doc
AYZ-986793185145219.doc
CS-6869909088.doc
JNP-011427957103.doc
output.113041944.txt
output.113043143.txt
UT-0728446.doc
XD-893528428045225.doc
index.html.99
WF-722408909238.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!