Report - Avast.exe

PE64 PE File
ScreenShot
Created 2023.08.08 09:30 Machine s1_win7_x6403
Filename Avast.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
3.8
ZERO API file : malware
VT API (file) 46 detected (Molotov, Tedy, Artemis, Kryptik, V0r5, GenKryptik, malicious, Eldorado, Attribute, HighConfidence, high confidence, GIIA, score, Reflo, Gencirc, Nekark, ziplm, Siggen3, R002C0DH123, Krypt, Xmrig, Detected, R570072, ai score=82, unsafe, tSjl4DNY5BP, confidence)
md5 7735f97175abb2da0cfce029d211dc66
sha256 f973483d000cc45314d1d5df0b6f6f84d06421d4aea1988bfeb04e025aa2c2fc
ssdeep 98304:IyZY8x15pS6O7Q1Oaw50T7NxVcNPx60hinhP9D1AJrix7JDg:IsbuQ1BwqJxVY560hQ5Wyls
imphash d3be2dc19ba54f7225d7679c3f791cf7
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/GbtcqcJvZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcJLF
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://51.77.140.74/api/endpoint.php FR OVH SAS 51.77.140.74 clean
pool.supportxmr.com Unknown 141.94.96.71 mailcious
51.77.140.74 FR OVH SAS 51.77.140.74 clean
141.94.96.144 Unknown 141.94.96.144 clean
141.94.96.195 Unknown 141.94.96.195 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1409f429c CloseHandle
 0x1409f42a4 CreateSemaphoreW
 0x1409f42ac DeleteCriticalSection
 0x1409f42b4 EnterCriticalSection
 0x1409f42bc GetCurrentThreadId
 0x1409f42c4 GetLastError
 0x1409f42cc GetStartupInfoA
 0x1409f42d4 InitializeCriticalSection
 0x1409f42dc IsDBCSLeadByteEx
 0x1409f42e4 LeaveCriticalSection
 0x1409f42ec MultiByteToWideChar
 0x1409f42f4 RaiseException
 0x1409f42fc ReleaseSemaphore
 0x1409f4304 RtlCaptureContext
 0x1409f430c RtlLookupFunctionEntry
 0x1409f4314 RtlUnwindEx
 0x1409f431c RtlVirtualUnwind
 0x1409f4324 SetLastError
 0x1409f432c SetUnhandledExceptionFilter
 0x1409f4334 Sleep
 0x1409f433c TlsAlloc
 0x1409f4344 TlsFree
 0x1409f434c TlsGetValue
 0x1409f4354 TlsSetValue
 0x1409f435c VirtualProtect
 0x1409f4364 VirtualQuery
 0x1409f436c WaitForSingleObject
 0x1409f4374 WideCharToMultiByte
msvcrt.dll
 0x1409f4384 __C_specific_handler
 0x1409f438c ___lc_codepage_func
 0x1409f4394 ___mb_cur_max_func
 0x1409f439c __getmainargs
 0x1409f43a4 __initenv
 0x1409f43ac __iob_func
 0x1409f43b4 __set_app_type
 0x1409f43bc __setusermatherr
 0x1409f43c4 _acmdln
 0x1409f43cc _amsg_exit
 0x1409f43d4 _cexit
 0x1409f43dc _commode
 0x1409f43e4 _errno
 0x1409f43ec _fmode
 0x1409f43f4 _initterm
 0x1409f43fc _onexit
 0x1409f4404 _wcsicmp
 0x1409f440c _wcsnicmp
 0x1409f4414 abort
 0x1409f441c calloc
 0x1409f4424 exit
 0x1409f442c fprintf
 0x1409f4434 fputc
 0x1409f443c fputs
 0x1409f4444 fputwc
 0x1409f444c free
 0x1409f4454 fwprintf
 0x1409f445c fwrite
 0x1409f4464 localeconv
 0x1409f446c malloc
 0x1409f4474 memcpy
 0x1409f447c memset
 0x1409f4484 realloc
 0x1409f448c signal
 0x1409f4494 strcat
 0x1409f449c strcmp
 0x1409f44a4 strerror
 0x1409f44ac strlen
 0x1409f44b4 strncmp
 0x1409f44bc strstr
 0x1409f44c4 vfprintf
 0x1409f44cc wcscat
 0x1409f44d4 wcscpy
 0x1409f44dc wcslen
 0x1409f44e4 wcsncmp
 0x1409f44ec wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure