× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bda736fe0d8fe841d9efae96ff00b79e3cac730e8cfac14ba23c1d340749a196
File name: Invoice_129302.docm
Detection ratio: 8 / 59
Analysis date: 2017-06-05 09:28:58 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
AhnLab-V3 WM/Downloader 20170605
Avira (no cloud) W97M/Agent.7510415 20170605
F-Secure Trojan:W97M/MaliciousMacro.GEN 20170605
Kaspersky HEUR:Trojan-Downloader.Script.Generic 20170605
Panda VBS/Jenxcus.A 20170604
Qihoo-360 virus.office.obfuscated.1 20170605
TrendMicro HEUR_VBA.O2 20170605
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20170605
Ad-Aware 20170605
AegisLab 20170605
Alibaba 20170605
ALYac 20170605
Antiy-AVL 20170605
Arcabit 20170605
Avast 20170605
AVG 20170605
AVware 20170605
Baidu 20170601
BitDefender 20170605
Bkav 20170602
CAT-QuickHeal 20170605
ClamAV 20170605
CMC 20170605
Comodo 20170605
CrowdStrike Falcon (ML) 20170420
Cyren 20170605
DrWeb 20170605
Emsisoft 20170605
Endgame 20170515
ESET-NOD32 20170605
F-Prot 20170605
Fortinet 20170605
GData 20170605
Ikarus 20170605
Sophos ML 20170604
Jiangmin 20170605
K7AntiVirus 20170604
K7GW 20170605
Kingsoft 20170605
Malwarebytes 20170605
McAfee 20170605
McAfee-GW-Edition 20170604
Microsoft 20170605
eScan 20170605
NANO-Antivirus 20170605
nProtect 20170605
Palo Alto Networks (Known Signatures) 20170605
Rising 20170605
SentinelOne (Static ML) 20170516
Sophos AV 20170605
SUPERAntiSpyware 20170605
Symantec 20170605
Symantec Mobile Insight 20170605
Tencent 20170605
TheHacker 20170605
TotalDefense 20170605
TrendMicro-HouseCall 20170605
Trustlook 20170605
VBA32 20170605
VIPRE 20170605
ViRobot 20170605
Webroot 20170605
WhiteArmor 20170601
Yandex 20170602
Zillya 20170602
Zoner 20170605
The file being studied follows the Open XML file format! More specifically, it is a Office Open XML Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May perform operations with other files.
May create OLE objects.
May enumerate open windows.
Seems to contain deobfuscation code.
Seems to contain code to deceive researchers and automatic analysis systems.
Macros and VBA code streams
[+] ThisDocument.cls word/vbaProject.bin VBA/ThisDocument 30086 bytes
obfuscated open-file write-file
[+] Module1.bas word/vbaProject.bin VBA/Module1 7438 bytes
create-ole enum-windows obfuscated open-file
[+] Class1.cls word/vbaProject.bin VBA/Class1 811 bytes
obfuscated write-file
[+] Locl.cls word/vbaProject.bin VBA/Locl 330 bytes
[+] Module2.bas word/vbaProject.bin VBA/Module2 33437 bytes
anti-analysis create-ole handle-file obfuscated open-file write-file
Content types
bin
rels
xml
Package relationships
word/document.xml
docProps/app.xml
docProps/core.xml
Core document properties
dc:creator
1
cp:lastModifiedBy
Derek
cp:revision
2
dcterms:created
2017-06-05T09:25:00Z
dcterms:modified
2017-06-05T09:25:00Z
cp:contentStatus
Microsoft.XMLHTTPFAPLMAdodb.streaMFAPLMshell.ApplicationFAPLMWscript.shellFAPLMProcessFAPLMGeTFAPLMTeMPFAPLMTypeFAPLMopenFAPLMwriteFAPLMresponseBodyFAPLMsavetofileFAPLM\\miniramon.exe
Application document properties
Template
Normal.dotm
TotalTime
0
Pages
1
Words
0
Characters
0
Application
Microsoft Office Word
DocSecurity
0
Lines
0
Paragraphs
0
ScaleCrop
false
vt:lpstr
Title
vt:i4
1
vt:lpstr
\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435
vt:i4
1
LinksUpToDate
false
CharactersWithSpaces
0
SharedDoc
false
HyperlinksChanged
false
AppVersion
15.0000
Document languages
Language
Prevalence
ru-ru
2
en-gb
1
en-us
1
ar-sa
1
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

TitlesOfParts
,

LinksUpToDate
No

LastModifiedBy
Derek

HeadingPairs
Title, 1, , 1

ZipFileName
[Content_Types].xml

Template
Normal.dotm

ZipRequiredVersion
20

ModifyDate
2017:06:05 09:25:00Z

ZipCRC
0x7aec387e

Words
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/vnd.ms-word.document.macroEnabled

ZipBitFlag
0x0006

CreateDate
2017:06:05 09:25:00Z

Lines
0

AppVersion
15.0

ZipUncompressedSize
1453

ZipCompressedSize
391

Characters
0

CharactersWithSpaces
0

DocSecurity
None

ZipModifyDate
1980:01:01 00:00:00

FileType
DOCM

Application
Microsoft Office Word

TotalEditTime
0

ZipCompression
Deflated

Pages
1

Creator
1

FileTypeExtension
docm

Paragraphs
0

ContentStatus
Microsoft.XMLHTTPFAPLMAdodb.streaMFAPLMshell.ApplicationFAPLMWscript.shellFAPLMProcessFAPLMGeTFAPLMTeMPFAPLMTypeFAPLMopenFAPLMwriteFAPLMresponseBodyFAPLMsavetofileFAPLM\miniramon.exe

The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
14
Uncompressed size
173750
Highest datetime
1980-01-01 00:00:00
Lowest datetime
1980-01-01 00:00:00
Contained files by extension
xml
10
bin
1
Contained files by type
XML
13
Microsoft Office
1
Compressed bundles
File identification
MD5 4c5b9135a08c187f0095e168cb3d23b8
SHA1 e1fca09934bf8229eb4c9b3aa4502f9672d0c35b
SHA256 bda736fe0d8fe841d9efae96ff00b79e3cac730e8cfac14ba23c1d340749a196
ssdeep
1536:zy4Vm8YTYyvVOM/yqLqsa3bQzF67rYbffNZ/JRnZ8X80VDNtE:rK9OAJEcZ67rSfDxRZPKw

File size 65.7 KB ( 67323 bytes )
File type Office Open XML Document
Magic literal
Zip archive data, at least v2.0 to extract

TrID Word Microsoft Office Open XML Format document (with Macro) (53.0%)
Word Microsoft Office Open XML Format document (23.9%)
Open Packaging Conventions container (17.8%)
ZIP compressed archive (4.0%)
PrintFox/Pagefox bitmap (var. P) (1.0%)
Tags
obfuscated open-file enum-windows handle-file docx macros write-file anti-analysis create-ole

VirusTotal metadata
First submission 2017-06-05 09:28:58 UTC ( 1 year, 10 months ago )
Last submission 2017-06-05 13:08:53 UTC ( 1 year, 10 months ago )
File names Invoice_129302.docm
Invoice_129302.docm
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!