| Size | 37.1MB |
|---|---|
| Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5 | 77d51d6c11e99d73b5495d316a4c024e |
| SHA1 | 2dc2463100796171996b38f423a654979c476316 |
| SHA256 | 9cf7ff5d77fb4bd3133cc94f1c014db1eaeb483db9aa2fad2652bccbe3b53e58 |
| SHA512 |
57428dae726137e6093985a0a0630712786c3115e63f8d35bd4179cbbb91cfa3c937b31263c6cb975fbde565ddea50efd436aa58b51410a7c04c8ec63534bad7
|
| CRC32 | 59B23498 |
| ssdeep | None |
| Yara |
|
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Feb. 16, 2026, 12:59 p.m. | Feb. 16, 2026, 1:03 p.m. | 250 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2026-02-16 11:59:23,015 [analyzer] DEBUG: Starting analyzer from: C:\tmppw5mq4 2026-02-16 11:59:23,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\nVmMdOzVHkWpPgMkwCjkSStZMZ 2026-02-16 11:59:23,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\NEBRnfjgevgNWydjUZopvGpYNqP 2026-02-16 11:59:23,233 [analyzer] DEBUG: Started auxiliary module Curtain 2026-02-16 11:59:23,233 [analyzer] DEBUG: Started auxiliary module DbgView 2026-02-16 11:59:23,640 [analyzer] DEBUG: Started auxiliary module Disguise 2026-02-16 11:59:23,812 [analyzer] DEBUG: Loaded monitor into process with pid 504 2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module Human 2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module Reboot 2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module RecentFiles 2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module Screenshots 2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module Sysmon 2026-02-16 11:59:23,905 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2026-02-16 11:59:24,453 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Gunz.exe' with arguments '' and pid 2020 2026-02-16 11:59:25,453 [analyzer] INFO: Process with pid 2020 has terminated 2026-02-16 11:59:25,453 [analyzer] INFO: Process list is empty, terminating analysis. 2026-02-16 11:59:26,640 [analyzer] INFO: Terminating remaining processes before shutdown. 2026-02-16 11:59:26,640 [analyzer] INFO: Analysis completed.
2026-02-16 12:59:33,553 [cuckoo.core.scheduler] INFO: Task #7456800: acquired machine win7x646 (label=win7x646) 2026-02-16 12:59:33,567 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.206 for task #7456800 2026-02-16 12:59:34,057 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3532414 (interface=vboxnet0, host=192.168.168.206) 2026-02-16 13:01:56,549 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x646 2026-02-16 13:01:57,277 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x646 to vmcloak 2026-02-16 13:03:07,447 [cuckoo.core.guest] INFO: Starting analysis #7456800 on guest (id=win7x646, ip=192.168.168.206) 2026-02-16 13:03:08,467 [cuckoo.core.guest] DEBUG: win7x646: not ready yet 2026-02-16 13:03:13,731 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x646, ip=192.168.168.206) 2026-02-16 13:03:15,578 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x646, ip=192.168.168.206, monitor=latest, size=6660546) 2026-02-16 13:03:18,611 [cuckoo.core.resultserver] DEBUG: Task #7456800: live log analysis.log initialized. 2026-02-16 13:03:19,372 [cuckoo.core.resultserver] DEBUG: Task #7456800 is sending a BSON stream 2026-02-16 13:03:20,648 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'shots/0001.jpg' 2026-02-16 13:03:20,696 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 133515 2026-02-16 13:03:22,169 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'curtain/1771239566.53.curtain.log' 2026-02-16 13:03:22,173 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 36 2026-02-16 13:03:22,394 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'sysmon/1771239566.64.sysmon.xml' 2026-02-16 13:03:22,574 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 49922 2026-02-16 13:03:22,775 [cuckoo.core.resultserver] DEBUG: Task #7456800 had connection reset for <Context for LOG> 2026-02-16 13:03:24,275 [cuckoo.core.guest] INFO: win7x646: analysis completed successfully 2026-02-16 13:03:24,324 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2026-02-16 13:03:24,418 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2026-02-16 13:03:25,725 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x646 to path /srv/cuckoo/cwd/storage/analyses/7456800/memory.dmp 2026-02-16 13:03:25,737 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x646 2026-02-16 13:03:34,139 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.206 for task #7456800 2026-02-16 13:03:34,922 [cuckoo.core.scheduler] DEBUG: Released database task #7456800 2026-02-16 13:03:34,977 [cuckoo.core.scheduler] INFO: Task #7456800: analysis procedure completed
| description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
| description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
| section | |
| section | .themida |
| section | .boot |
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_ICON | language | LANG_KOREAN | filetype | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | sublanguage | SUBLANG_KOREAN | offset | 0x04711548 | size | 0x00000468 | ||||||||||||||||||
| name | RT_GROUP_ICON | language | LANG_KOREAN | filetype | Targa image data - Map 32 x 17077 x 1 +1 | sublanguage | SUBLANG_KOREAN | offset | 0x047119c0 | size | 0x0000005a | ||||||||||||||||||
| name | RT_VERSION | language | LANG_KOREAN | filetype | data | sublanguage | SUBLANG_KOREAN | offset | 0x04711a2c | size | 0x000002cc | ||||||||||||||||||
| section | {u'size_of_data': u'0x001a6000', u'virtual_address': u'0x00001000', u'entropy': 7.980702387347508, u'name': u' ', u'virtual_size': u'0x003c0080'} | entropy | 7.98070238735 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x0003a600', u'virtual_address': u'0x003c2000', u'entropy': 7.955879635486761, u'name': u' ', u'virtual_size': u'0x000a2c2c'} | entropy | 7.95587963549 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x00011400', u'virtual_address': u'0x00465000', u'entropy': 7.963810242802644, u'name': u' ', u'virtual_size': u'0x01a23104'} | entropy | 7.9638102428 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x01fce800', u'virtual_address': u'0x01e8a000', u'entropy': 7.986234831427264, u'name': u' ', u'virtual_size': u'0x027def60'} | entropy | 7.98623483143 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x00023800', u'virtual_address': u'0x04669000', u'entropy': 7.971343784827258, u'name': u' ', u'virtual_size': u'0x00079d92'} | entropy | 7.97134378483 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x0030de00', u'virtual_address': u'0x04bf4000', u'entropy': 7.941484974590594, u'name': u'.boot', u'virtual_size': u'0x0030de00'} | entropy | 7.94148497459 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.995198538639 | description | Overall entropy of this PE file is high | |||||||||||
| Bkav | W32.AIDetectMalware |