× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d2166966a26e1cbc3822994ab53818b6f3d03a96034558bf5c14b74668156909
File name: PAY29015856342765.doc
Detection ratio: 11 / 59
Analysis date: 2019-02-05 00:46:05 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20181108
K7AntiVirus Trojan ( 00536d111 ) 20190204
K7GW Trojan ( 00536d111 ) 20190204
Microsoft Trojan:Script/Foretype.A!ml 20190205
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190204
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190204
Tencent Heur.Macro.Generic.Gen.e 20190205
TrendMicro HEUR_VBA.O.ELBP 20190205
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190204
Zoner Probably W97Shell 20190204
Acronis 20190130
Ad-Aware 20190204
AegisLab 20190204
AhnLab-V3 20190204
Alibaba 20180921
ALYac 20190204
Antiy-AVL 20190204
Arcabit 20190204
Avast 20190204
Avast-Mobile 20190204
AVG 20190204
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
BitDefender 20190204
Bkav 20190201
CAT-QuickHeal 20190204
ClamAV 20190204
CMC 20190204
Comodo 20190204
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190205
Cyren 20190204
DrWeb 20190204
eGambit 20190205
Emsisoft 20190204
ESET-NOD32 20190204
F-Prot 20190204
F-Secure 20190205
Fortinet 20190204
GData 20190204
Ikarus 20190204
Sophos ML 20181128
Jiangmin 20190204
Kaspersky 20190205
Kingsoft 20190205
Malwarebytes 20190204
MAX 20190205
McAfee 20190204
McAfee-GW-Edition 20190204
eScan 20190204
Palo Alto Networks (Known Signatures) 20190205
Panda 20190204
Qihoo-360 20190205
Rising 20190204
Sophos AV 20190204
SUPERAntiSpyware 20190130
Symantec 20190204
TheHacker 20190203
TotalDefense 20190204
Trapmine 20190123
TrendMicro-HouseCall 20190205
Trustlook 20190205
VBA32 20190204
ViRobot 20190203
Webroot 20190205
Yandex 20190204
Zillya 20190204
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-04 14:59:00
revision_number
2
author
admin
page_count
1
last_saved
2019-02-04 14:59:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
1
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
18816
type_literal
stream
sid
26
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7066
type_literal
stream
sid
1
name
Data
size
224579
type_literal
stream
sid
25
name
Macros/PROJECT
size
590
type_literal
stream
sid
24
name
Macros/PROJECTwm
size
137
type_literal
stream
sid
13
type
macro
name
Macros/VBA/NrshV7NUp
size
1137
type_literal
stream
sid
11
type
macro
name
Macros/VBA/OJ75BFVLN
size
1366
type_literal
stream
sid
8
type
macro
name
Macros/VBA/ThisDocument
size
2186
type_literal
stream
sid
15
name
Macros/VBA/_VBA_PROJECT
size
3767
type_literal
stream
sid
17
name
Macros/VBA/__SRP_0
size
2233
type_literal
stream
sid
18
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
9
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
10
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
16
name
Macros/VBA/dir
size
943
type_literal
stream
sid
12
type
macro
name
Macros/VBA/eI5Y1vzA3
size
900
type_literal
stream
sid
14
type
macro (only attributes)
name
Macros/VBA/f
size
1172
type_literal
stream
sid
22
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
23
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
20
name
Macros/f/f
size
126
type_literal
stream
sid
21
name
Macros/f/o
size
2304
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 304 bytes
[+] OJ75BFVLN.bas Macros/VBA/OJ75BFVLN 211 bytes
exe-pattern run-file
[+] eI5Y1vzA3.bas Macros/VBA/eI5Y1vzA3 68 bytes
[+] NrshV7NUp.bas Macros/VBA/NrshV7NUp 143 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:04 22:59:00

Company
Salve

Characters
1

HyperlinksChanged
No

RevisionNumber
2

MIMEType
application/msword

Words
0

CreateDate
2019:02:04 22:59:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 7e37dfd3008636fe0305b1d16bb29567
SHA1 0ef77c8f77c166c158339a01b92982f49cfb2669
SHA256 d2166966a26e1cbc3822994ab53818b6f3d03a96034558bf5c14b74668156909
ssdeep
6144:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwi0:cQQLGSVuz1QHhxztCi0

File size 265.0 KB ( 271360 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Feb 03 22:59:00 2019, Last Saved Time/Date: Sun Feb 03 22:59:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file exe-pattern doc

VirusTotal metadata
First submission 2019-02-05 00:46:05 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-05 01:14:40 UTC ( 1 month, 2 weeks ago )
File names US34804729912687780.doc
PAY627997604051033341.doc
701437910789601.doc
86980202935457.doc
US451355478661804932.doc
PGY569488535824.doc
PAY977927296712.doc
Y91539696644562271.doc
US9762366485541042440.doc
PAY29015856342765.doc
US0214025834.doc
US141998155.doc
US789144796.doc
emotet_e2_d2166966a26e1cbc3822994ab53818b6f3d03a96034558bf5c14b74668156909_2019-02-05__004502.doc
US14769168388141814389.doc
PAY074297752285084457.doc
GHEJA209388462.doc
USBW197176665709918912.doc
PAY4401216732345001506.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!