Code:
#OfficeMalScanner.exe 301d3e6dff463163c15e9a612048a001 scan debug
+------------------------------------------+
| OfficeMalScanner v0.41 |
| Frank Boldewin / www.reconstructer.org |
+------------------------------------------+
SCAN mode selected
Opening file 301d3e6dff463163c15e9a612048a001
Filesize is 838144 (0xcca00) Bytes
Valid file format found.
Scanning now...
FS:[30h] (Method 1) signature found at offset: 0xa07
64A130000000 mov eax, fs:[30h]
8B400C mov eax, [eax+0Ch]
8B701C mov esi, [eax+1Ch]
AD lodsd
8B4008 mov eax, [eax+08h]
5E pop esi
C3 ret
60 pushad
8B6C2424 mov ebp, [esp+24h]
8B453C mov eax, [ebp+3Ch]
8B542878 mov edx, [eax+ebp+78h]
03D5 add edx, ebp
8B4A18 mov ecx, [edx+18h]
8B5A20 mov ebx, [edx+20h]
03DD add ebx, ebp
E334 jecxz $+36h
--------------------------------------------------------------------------
API-Hashing signature found at offset: 0xa3f
7407 jz $+09h
C1CF0D ror edi, 0Dh
03F8 add edi, eax
EBF4 jmp $-0Ah
3B7C2428 cmp edi, [esp+28h]
75E1 jnz $-1Dh
8B5A24 mov ebx, [edx+24h]
03DD add ebx, ebp
668B0C4B mov cx, [ebx+ecx*2]
8B5A1C mov ebx, [edx+1Ch]
03DD add ebx, ebp
8B048B mov eax, [ebx+ecx*4]
03C5 add eax, ebp
8944241C mov [esp+1Ch], eax
61 popad
C20800 retn 0008h
--------------------------------------------------------------------------
API-Hashing signature found at offset: 0xae0
7408 jz $+0Ah
C1CE0D ror esi, 0Dh
03F2 add esi, edx
40 inc eax
EBF1 jmp $-0Dh
3BFE cmp edi, esi
5E pop esi
75E5 jnz $-19h
5A pop edx
8BEB mov ebp, ebx
8B5A24 mov ebx, [edx+24h]
03DD add ebx, ebp
668B0C4B mov cx, [ebx+ecx*2]
8B5A1C mov ebx, [edx+1Ch]
03DD add ebx, ebp
8B048B mov eax, [ebx+ecx*4]
--------------------------------------------------------------------------
NOP slides signature found at offset: 0xad879
90 nop
90 nop
90 nop
EB2B jmp $+2Dh
33C0 xor eax, eax
50 push eax
648920 mov fs:[eax], esp
33FF xor edi, edi
81C700100000 add edi, 00001000h
B8D0CF11E0 mov eax, E011CFD0h
3B07 cmp eax, [edi]
75F1 jnz $-0Dh
40 inc eax
3B87000A0000 cmp eax, [edi+00000A00h]
75E8 jnz $-16h
81C7000A0000 add edi, 00000A00h
--------------------------------------------------------------------------
LODSD/STOSD SUB decryption signature found at offset: 0x700f2
AD lodsd
2DE49E3858 sub eax, 58389EE4h
AB stosd
843B test bh, [ebx]
98 cwde
1F pop ds
5C pop esp
7A57 jpe $+59h
6BA3687696978B imul esp, [ebx-68698998h], 8Bh
A8DC test al, DCh
A0B8BA9CED mov al, [ED9CBAB8h]
823E40 and byte ptr [esi], 40h
1C63 sbb al, 63h
27 daa
D7 xlat
A5 movsd
--------------------------------------------------------------------------
JMP [0xEB]/CALL/POP signature found at offset: 0xa9a
EB6E jmp $+70h
5E pop esi
FC cld
F3A4 rep movsb
C3 ret
41 inc ecx
5B pop ebx
52 push edx
03E1 add esp, ecx
03E1 add esp, ecx
03E1 add esp, ecx
03E1 add esp, ecx
83EC04 sub esp, 00000004h
5A pop edx
53 push ebx
8BDA mov ebx, edx
--------------------------------------------------------------------------
JMP [0xEB]/CALL/POP signature found at offset: 0xb11
EB0F jmp $+11h
5A pop edx
33C9 xor ecx, ecx
66B9FA05 mov cx, 05FAh
8032FC xor byte ptr [edx], FFFFFFFCh
42 inc edx
E2FA loop $-04h
EB05 jmp $+07h
E8ECFFFFFF call $-0000000Fh
A97710AFAA test eax, AAAF1077h
AB stosd
17 pop ss
9F lahf
AA stosb
98 cwde
5D pop ebp
--------------------------------------------------------------------------
Analysis finished!
-----------------------------------------------------------------------------
301d3e6dff463163c15e9a612048a001 seems to be malicious! Malicious Index = 19
-----------------------------------------------------------------------------