× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9
File name: Invoice02
Detection ratio: 43 / 57
Analysis date: 2016-05-17 19:58:48 UTC ( 1 year, 4 months ago )
Antivirus Result Update
Ad-Aware W97M.Downloader.AUV 20160517
AegisLab Macro.Troj.Downloader!c 20160517
AhnLab-V3 W97M/Downloader 20160517
ALYac W97M.Downloader.AUV 20160517
Antiy-AVL Trojan[Downloader]/MSWord.Agent.aaf 20160517
Arcabit HEUR.VBA.Trojan.d 20160517
Avast VBA:Downloader-AQF [Trj] 20160517
AVG W97M/Downloader 20160517
Avira (no cloud) WM/Dldr.Agent.lod 20160517
AVware Trojan-Downloader.W97M.Agent.asl (v) 20160511
Baidu VBA.Trojan-Downloader.Agent.xi 20160517
BitDefender W97M.Downloader.AUV 20160517
CAT-QuickHeal W97M.Dropper.UX 20160517
ClamAV Doc.Dropper.Agent-1408163 20160517
Comodo UnclassifiedMalware 20160516
Cyren W97M/Downldr 20160517
DrWeb W97M.DownLoader.890 20160517
Emsisoft W97M.Downloader.AUV (B) 20160517
ESET-NOD32 VBA/TrojanDownloader.Agent.ASL 20160517
F-Prot New or modified W97M/Downldr 20160517
F-Secure Trojan:W97M/MaliciousMacro.GEN 20160517
Fortinet WM/TrojanDownloader.9BB7!tr 20160517
GData W97M.Downloader.AUV 20160517
Ikarus Trojan-Downloader.O97M.Bartallex 20160517
K7AntiVirus Trojan ( 0001140e1 ) 20160517
K7GW Trojan ( 0001140e1 ) 20160517
Kaspersky Trojan-Downloader.MSWord.Agent.aaf 20160517
McAfee W97M/Downloader.axq 20160517
McAfee-GW-Edition W97M/Downloader.axq 20160517
Microsoft TrojanDownloader:O97M/Bartallex 20160517
eScan W97M.Downloader.AUV 20160517
NANO-Antivirus Trojan.Script.Agent.eajuge 20160517
nProtect Trojan-Downloader/W97M.Drisun 20160517
Panda O97M/Downloader 20160517
Qihoo-360 virus.office.obfuscated.1 20160517
Rising Trojan.DL-Generic/Macro!1.A4C9 20160517
Sophos AV Troj/DocDl-BAI 20160517
Symantec W97M.Downloader 20160517
Tencent Win32.Trojan-downloader.Agent.Dyzd 20160517
TrendMicro W2KM_HPSPLICAP.SM 20160517
TrendMicro-HouseCall W2KM_DRIDEX.SMXA 20160517
VIPRE Trojan-Downloader.W97M.Agent.asl (v) 20160517
ViRobot W97M.S.Downloader.66048.AR[h] 20160517
Alibaba 20160516
Baidu-International 20160517
Bkav 20160517
CMC 20160516
Jiangmin 20160517
Kingsoft 20160517
Malwarebytes 20160517
SUPERAntiSpyware 20160517
TheHacker 20160516
TotalDefense 20160517
VBA32 20160517
Yandex 20160517
Zillya 20160517
Zoner 20160517
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
last_author
alex
creation_datetime
2016-02-16 10:35:00
revision_number
2
author
Microsoft Office
page_count
1
last_saved
2016-02-16 10:35:00
template
Normal.dotm
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
line_count
1
company
Microsoft Corporation
version
786432
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
14912
type_literal
stream
sid
30
name
\x01CompObj
size
121
type_literal
stream
sid
4
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
3
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
1
name
1Table
size
7397
type_literal
stream
sid
23
name
Macros/PROJECT
size
582
type_literal
stream
sid
24
name
Macros/PROJECTwm
size
119
type_literal
stream
sid
28
name
Macros/UserForm1/\x01CompObj
size
97
type_literal
stream
sid
29
name
Macros/UserForm1/\x03VBFrame
size
290
type_literal
stream
sid
26
name
Macros/UserForm1/f
size
131
type_literal
stream
sid
27
name
Macros/UserForm1/o
size
180
type_literal
stream
sid
8
type
macro
name
Macros/VBA/Module1
size
6451
type_literal
stream
sid
9
type
macro
name
Macros/VBA/Module2
size
11343
type_literal
stream
sid
21
type
macro
name
Macros/VBA/ThisDocument
size
1608
type_literal
stream
sid
20
type
macro (only attributes)
name
Macros/VBA/UserForm1
size
1384
type_literal
stream
sid
22
name
Macros/VBA/_VBA_PROJECT
size
5864
type_literal
stream
sid
10
name
Macros/VBA/__SRP_0
size
3682
type_literal
stream
sid
11
name
Macros/VBA/__SRP_1
size
190
type_literal
stream
sid
12
name
Macros/VBA/__SRP_2
size
312
type_literal
stream
sid
13
name
Macros/VBA/__SRP_3
size
103
type_literal
stream
sid
14
name
Macros/VBA/__SRP_4
size
1482
type_literal
stream
sid
15
name
Macros/VBA/__SRP_5
size
160
type_literal
stream
sid
16
name
Macros/VBA/__SRP_6
size
2324
type_literal
stream
sid
17
name
Macros/VBA/__SRP_7
size
214
type_literal
stream
sid
18
name
Macros/VBA/__SRP_8
size
338
type_literal
stream
sid
19
name
Macros/VBA/__SRP_9
size
66
type_literal
stream
sid
7
name
Macros/VBA/dir
size
895
type_literal
stream
sid
2
name
WordDocument
size
4096
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 39 bytes
[+] Module1.bas Macros/VBA/Module1 1512 bytes
create-ole
[+] Module2.bas Macros/VBA/Module2 3446 bytes
create-ole obfuscated open-file
ExifTool file metadata
SharedDoc
No

Author
Microsoft Office

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
alex

HeadingPairs
, 1

Template
Normal.dotm

CharCountWithSpaces
0

CreateDate
2016:02:16 09:35:00

CompObjUserType
???????? Microsoft Office Word 97-2003

ModifyDate
2016:02:16 09:35:00

Company
Microsoft Corporation

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
12.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
39

FileTypeExtension
doc

Paragraphs
1

Compressed bundles
File identification
MD5 f205a9e8f1be8b8a5f75ac9e9be2b399
SHA1 7188b32756dee187cd0831a01fa2cfad63987717
SHA256 97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9
ssdeep
768:pkKCBBHdelAX/Ldw2TCPDimJGhrH+w/Dp:p3IRdeoCPDotR

File size 64.5 KB ( 66048 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: Microsoft Office, Template: Normal.dotm, Last Saved By: alex, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 15 09:35:00 2016, Last Saved Time/Date: Mon Feb 15 09:35:00 2016, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (80.0%)
Generic OLE2 / Multistream Compound File (20.0%)
Tags
obfuscated macros open-file doc create-ole

VirusTotal metadata
First submission 2016-02-16 14:09:53 UTC ( 1 year, 7 months ago )
Last submission 2016-05-17 19:58:48 UTC ( 1 year, 4 months ago )
File names af9982d004dea1790af212b9bad552b0
97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9.bin
invoice_J-01619624.doc
Invoice02
0e94c23981f3371a97f9729669ba3f02b10a6da2
97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9.doc
doc.doc
invoice_J-98148270.doc
9638a3011161469a2c726c31bd7d5538
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!