× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a67315f2d627b9eafb91ed202d1f95c756d5ae5448624ba937f56681f79f373a
File name: INVOICE 67247.doc
Detection ratio: 14 / 58
Analysis date: 2018-12-07 13:13:44 UTC ( 4 months, 2 weeks ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20181207
Baidu VBA.Trojan-Downloader.Agent.dvm 20181207
CAT-QuickHeal W97M.Emotet.Heur 20181206
Endgame malicious (high confidence) 20181108
GData Macro.Trojan-Downloader.Shallow.S 20181207
Ikarus Trojan.VBA.Agent 20181207
Microsoft Trojan:O97M/Sonbokli.A!cl 20181207
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20181207
Qihoo-360 virus.office.qexvmc.1070 20181207
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ISB.Downloader!gen172 20181207
TACHYON Suspicious/W97M.Obfus.Gen.6 20181207
Tencent Heur.Macro.Generic.Gen.h 20181207
Zoner Probably W97Obfuscated 20181207
Ad-Aware 20181207
AegisLab 20181207
AhnLab-V3 20181207
Alibaba 20180921
ALYac 20181207
Antiy-AVL 20181207
Avast 20181207
Avast-Mobile 20181207
AVG 20181207
Avira (no cloud) 20181207
Babable 20180918
BitDefender 20181207
Bkav 20181206
ClamAV 20181207
CMC 20181206
Comodo 20181207
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181207
Cyren 20181207
DrWeb 20181207
eGambit 20181207
Emsisoft 20181207
ESET-NOD32 20181207
F-Prot 20181207
F-Secure 20181207
Fortinet 20181207
Sophos ML 20181128
Jiangmin 20181206
K7AntiVirus 20181207
K7GW 20181207
Kaspersky 20181207
Kingsoft 20181207
Malwarebytes 20181207
MAX 20181207
McAfee 20181207
eScan 20181207
Palo Alto Networks (Known Signatures) 20181207
Panda 20181206
Rising 20181207
Sophos AV 20181207
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TheHacker 20181202
Trapmine 20181205
TrendMicro 20181207
TrendMicro-HouseCall 20181207
Trustlook 20181207
VBA32 20181206
VIPRE 20181207
ViRobot 20181207
Webroot 20181207
Yandex 20181204
Zillya 20181206
ZoneAlarm by Check Point 20181207
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
creation_datetime
2018-12-07 13:06:00
revision_number
1
page_count
1
word_count
3
last_saved
2018-12-07 13:06:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
23
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
25
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
5056
type_literal
stream
sid
22
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
9635
type_literal
stream
sid
1
name
Data
size
27637
type_literal
stream
sid
21
name
Macros/PROJECT
size
430
type_literal
stream
sid
20
name
Macros/PROJECTwm
size
56
type_literal
stream
sid
15
type
macro
name
Macros/VBA/BGWvAkEM
size
9143
type_literal
stream
sid
12
type
macro
name
Macros/VBA/XUJihQUO
size
1266
type_literal
stream
sid
16
name
Macros/VBA/_VBA_PROJECT
size
7953
type_literal
stream
sid
18
name
Macros/VBA/__SRP_0
size
1252
type_literal
stream
sid
19
name
Macros/VBA/__SRP_1
size
106
type_literal
stream
sid
13
name
Macros/VBA/__SRP_2
size
292
type_literal
stream
sid
14
name
Macros/VBA/__SRP_3
size
103
type_literal
stream
sid
17
name
Macros/VBA/dir
size
557
type_literal
stream
sid
8
name
MsoDataStore/\xd5SWS\xc0QK\xc23E\xc20MEDA\xc6\xcc\xddJ\xd2Q==/Item
size
306
type_literal
stream
sid
9
name
MsoDataStore/\xd5SWS\xc0QK\xc23E\xc20MEDA\xc6\xcc\xddJ\xd2Q==/Properties
size
341
type_literal
stream
sid
3
name
WordDocument
size
5166
Macros and VBA code streams
[+] XUJihQUO.cls Macros/VBA/XUJihQUO 29 bytes
[+] BGWvAkEM.bas Macros/VBA/BGWvAkEM 5891 bytes
run-file
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
25

CreateDate
2018:12:07 12:06:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:12:07 12:06:00

Characters
23

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
3

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 96ece72550367f46884ee9d80e7212bb
SHA1 94dde77f00e142e126ac1273339ebc43419a2e82
SHA256 a67315f2d627b9eafb91ed202d1f95c756d5ae5448624ba937f56681f79f373a
ssdeep
768:k2yB4OEKjmW9/MqtBMENPOgHvgn+1o95KMD0xz99j8ZFsi6dlnZa5jmhFw/9Vg6C:Lu7ljmW9/bvFM+a95KMD03I6/unhBY

File size 77.5 KB ( 79360 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Dec 06 12:06:00 2018, Last Saved Time/Date: Thu Dec 06 12:06:00 2018, Number of Pages: 1, Number of Words: 3, Number of Characters: 23, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2018-12-07 13:13:44 UTC ( 4 months, 2 weeks ago )
Last submission 2018-12-13 04:55:51 UTC ( 4 months, 1 week ago )
File names INVOICE 67247.doc
eForm-646394801278.doc
DOC-59154103436.doc
Test.txt
INV K55156JI 68092.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!