× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cb166bf8f89c65478277be66510fa5e3527a958c791052d0c2bd27d80dc9a199
File name: T741996341527.doc
Detection ratio: 12 / 58
Analysis date: 2019-02-22 07:59:45 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20190215
GData Macro.Trojan.Agent.AKV 20190222
Ikarus Trojan-Downloader.VBA.Agent 20190221
K7AntiVirus Trojan ( 00536d111 ) 20190222
K7GW Trojan ( 00536d111 ) 20190222
McAfee W97M/Downloader.cqc 20190222
McAfee-GW-Edition BehavesLike.Downloader.cg 20190222
Microsoft Trojan:O97M/Sonbokli.A!cl 20190222
Qihoo-360 virus.office.qexvmc.1090 20190222
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ISB.Downloader!gen80 20190222
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190222
Acronis 20190221
Ad-Aware 20190222
AegisLab 20190222
AhnLab-V3 20190222
Alibaba 20180921
ALYac 20190222
Antiy-AVL 20190222
Arcabit 20190222
Avast 20190222
Avast-Mobile 20190221
AVG 20190222
Avira (no cloud) 20190222
Babable 20180918
Baidu 20190215
BitDefender 20190222
Bkav 20190221
CAT-QuickHeal 20190221
ClamAV 20190221
CMC 20190221
Comodo 20190222
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190222
Cyren 20190222
DrWeb 20190222
eGambit 20190222
Emsisoft 20190222
ESET-NOD32 20190222
F-Prot 20190222
F-Secure 20190222
Fortinet 20190222
Sophos ML 20181128
Jiangmin 20190222
Kaspersky 20190222
Kingsoft 20190222
Malwarebytes 20190222
MAX 20190222
eScan 20190222
NANO-Antivirus 20190222
Palo Alto Networks (Known Signatures) 20190222
Panda 20190221
Rising 20190222
Sophos AV 20190222
SUPERAntiSpyware 20190220
Symantec Mobile Insight 20190220
TACHYON 20190222
Tencent 20190222
TheHacker 20190217
Trapmine 20190123
TrendMicro 20190222
TrendMicro-HouseCall 20190222
Trustlook 20190222
VBA32 20190221
ViRobot 20190222
Webroot 20190222
Yandex 20190221
Zillya 20190221
Zoner 20190222
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to hide the viewer or other applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2019-02-21 23:17:00
revision_number
1
page_count
1
word_count
2
last_saved
2019-02-21 23:17:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
13
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
14
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4160
type_literal
stream
sid
18
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7518
type_literal
stream
sid
1
name
Data
size
66804
type_literal
stream
sid
17
name
Macros/PROJECT
size
429
type_literal
stream
sid
16
name
Macros/PROJECTwm
size
53
type_literal
stream
sid
11
type
macro
name
Macros/VBA/C840010
size
63199
type_literal
stream
sid
12
name
Macros/VBA/_VBA_PROJECT
size
27838
type_literal
stream
sid
14
name
Macros/VBA/__SRP_0
size
1223
type_literal
stream
sid
15
name
Macros/VBA/__SRP_1
size
106
type_literal
stream
sid
9
name
Macros/VBA/__SRP_2
size
220
type_literal
stream
sid
10
name
Macros/VBA/__SRP_3
size
66
type_literal
stream
sid
8
type
macro (only attributes)
name
Macros/VBA/a7880266
size
1106
type_literal
stream
sid
13
name
Macros/VBA/dir
size
556
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] C840010.bas Macros/VBA/C840010 40141 bytes
hide-app obfuscated
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
14

CreateDate
2019:02:22 07:17:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:02:22 07:17:00

Characters
13

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
2

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 196dbb691aecfc8462b94ea779e7a169
SHA1 d8224caf420166ebb90c95cd06e1e1ac38f32b8b
SHA256 cb166bf8f89c65478277be66510fa5e3527a958c791052d0c2bd27d80dc9a199
ssdeep
3072:fEd93LpGo0aQL3ZLMzGLsSB49kz324XAw:fEd2Vlc+724XAw

File size 191.1 KB ( 195712 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Feb 21 07:17:00 2019, Last Saved Time/Date: Thu Feb 21 07:17:00 2019, Number of Pages: 1, Number of Words: 2, Number of Characters: 13, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros hide-app doc

VirusTotal metadata
First submission 2019-02-22 07:46:54 UTC ( 1 month, 4 weeks ago )
Last submission 2019-02-22 23:47:38 UTC ( 1 month, 3 weeks ago )
File names 022219_eInvoice_recept_204355.doc
emotet_e1_cb166bf8f89c65478277be66510fa5e3527a958c791052d0c2bd27d80dc9a199_2019-02-22__074505.doc
T741996341527.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!