Edit tour
Windows
Analysis Report
T710XblGiM.docm
Overview
General Information
Sample name: | T710XblGiM.docmrenamed because original name is a hash value |
Original sample name: | 140cc4e8f36d4403a99ed1557d11771bcdcd169f70b014f99e658b917f9ced2d.docm |
Analysis ID: | 1590803 |
MD5: | ef866288253b0d4d74a3aa7e8ee483cd |
SHA1: | befbd6f0cba766ebaf10d5de734936a982ab7d8a |
SHA256: | 140cc4e8f36d4403a99ed1557d11771bcdcd169f70b014f99e658b917f9ced2d |
Tags: | app8490744docmhko247blackuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Document contains OLE streams with names of living off the land binaries
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many GOTO operations indicating source code obfuscation
Document contains an embedded macro with GUI obfuscation
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains an embedded VBA which might only executes on specific systems (country or language check)
Document contains embedded VBA macros
Classification
- System is w10x64
- WINWORD.EXE (PID: 4612 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /A utomation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File opened: | Jump to behavior |
System Summary |
---|
Source: | Stream path 'VBA/Module1' : |