× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fbcd41ac2b4da177e97eb2696703b64c53512ec6aaa7743e4b1feb0c23bfd2ba
File name: INTERAC e-Transfer transaction details.doc
Detection ratio: 1 / 53
Analysis date: 2015-11-12 15:39:25 UTC ( 1 year, 9 months ago ) View latest
Antivirus Result Update
Arcabit HEUR(high).VBA.Trojan 20151112
AegisLab 20151111
Yandex 20151111
AhnLab-V3 20151112
Alibaba 20151112
ALYac 20151112
Antiy-AVL 20151112
Avast 20151112
AVG 20151112
Avira (no cloud) 20151112
AVware 20151112
Baidu-International 20151112
BitDefender 20151112
ByteHero 20151112
CAT-QuickHeal 20151112
ClamAV 20151112
CMC 20151112
Comodo 20151112
Cyren 20151112
DrWeb 20151112
Emsisoft 20151112
ESET-NOD32 20151112
F-Prot 20151112
F-Secure 20151112
Fortinet 20151112
GData 20151112
Ikarus 20151112
Jiangmin 20151111
K7AntiVirus 20151112
K7GW 20151112
Kaspersky 20151112
Malwarebytes 20151112
McAfee 20151112
McAfee-GW-Edition 20151112
Microsoft 20151112
eScan 20151112
NANO-Antivirus 20151112
nProtect 20151112
Panda 20151111
Qihoo-360 20151112
Rising 20151111
Sophos AV 20151112
SUPERAntiSpyware 20151112
Symantec 20151111
Tencent 20151112
TheHacker 20151110
TrendMicro 20151112
TrendMicro-HouseCall 20151112
VBA32 20151112
VIPRE 20151112
ViRobot 20151112
Zillya 20151111
Zoner 20151112
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
Automatically runs commands or instructions when the file is opened.
May read system environment variables.
May open a file.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
creation_datetime
2015-11-12 12:22:00
template
Normal.dotm
page_count
1
last_saved
2015-11-12 13:40:00
word_count
5
revision_number
1
application_name
Microsoft Office Word
character_count
35
code_page
Cyrillic
Document summary
line_count
1
characters_with_spaces
39
version
983040
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
6592
type_literal
stream
size
114
name
\x01CompObj
sid
18
type_literal
stream
size
284
name
\x05DocumentSummaryInformation
sid
9
type_literal
stream
size
404
name
\x05SummaryInformation
sid
8
type_literal
stream
size
8714
name
1Table
sid
7
type_literal
stream
size
13681
name
Data
sid
1
type_literal
stream
size
486
name
Macros/PROJECT
sid
17
type_literal
stream
size
65
name
Macros/PROJECTwm
sid
16
type_literal
stream
size
1226
type
macro
name
Macros/VBA/Module1
sid
13
type_literal
stream
size
4341
type
macro
name
Macros/VBA/ThisDocument
sid
12
type_literal
stream
size
3105
name
Macros/VBA/_VBA_PROJECT
sid
14
type_literal
stream
size
563
name
Macros/VBA/dir
sid
15
type_literal
stream
size
78028
name
ObjectPool/_1508855213/\x01Ole10Native
sid
6
type_literal
stream
size
6
name
ObjectPool/_1508855213/\x03ObjInfo
sid
5
type_literal
stream
size
4142
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 1313 bytes
exe-pattern auto-open create-ole environ obfuscated open-file
[+] Module1.bas Macros/VBA/Module1 149 bytes
run-file
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

LinksUpToDate
No

HeadingPairs
, 1

Template
Normal.dotm

CharCountWithSpaces
39

CreateDate
2015:11:12 11:22:00

Security
None

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2015:11:12 12:40:00

Characters
35

Pages
1

RevisionNumber
1

MIMEType
application/msword

Words
5

FileType
DOC

Lines
1

AppVersion
15.0

CodePage
Windows Cyrillic

Software
Microsoft Office Word

TotalEditTime
0

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 fccf0a8a008b063877c24d9a3175f997
SHA1 eca39cbda816b479030044f9d857567e1d4ae1ca
SHA256 fbcd41ac2b4da177e97eb2696703b64c53512ec6aaa7743e4b1feb0c23bfd2ba
ssdeep
1536:buVULKxqfGctMbhiuENo2mM4r6lSYwzxp:KVIf5qb4uao2p4r6lSX

File size 119.0 KB ( 121856 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Nov 11 11:22:00 2015, Last Saved Time/Date: Wed Nov 11 12:40:00 2015, Number of Pages: 1, Number of Words: 5, Number of Characters: 35, Security: 0

TrID Microsoft Word document (35.9%)
Microsoft Excel sheet (33.7%)
Microsoft Word document (old ver.) (21.3%)
Generic OLE2 / Multistream Compound File (8.9%)
Tags
obfuscated open-file auto-open exe-pattern doc run-file macros environ create-ole

VirusTotal metadata
First submission 2015-11-12 15:34:37 UTC ( 1 year, 9 months ago )
Last submission 2015-11-13 06:12:11 UTC ( 1 year, 9 months ago )
File names INTERAC e-Transfer transaction details.doc
INTERAC%20e-Transfer%20transaction%20details.doc";filename*=UTF-8''INTERAC%20e-Transfer%20transaction%20details.doc
INTERAC%20e-Transfer%20transaction%20details.doc
malware.doc
Rafael Rubery.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!