File Gunz.exe

Size 37.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 77d51d6c11e99d73b5495d316a4c024e
SHA1 2dc2463100796171996b38f423a654979c476316
SHA256 9cf7ff5d77fb4bd3133cc94f1c014db1eaeb483db9aa2fad2652bccbe3b53e58
SHA512
57428dae726137e6093985a0a0630712786c3115e63f8d35bd4179cbbb91cfa3c937b31263c6cb975fbde565ddea50efd436aa58b51410a7c04c8ec63534bad7
CRC32 59B23498
ssdeep None
Yara
  • vmdetect - Possibly employs anti-virtualization techniques
  • antisb_threatExpert - Anti-Sandbox checks for ThreatExpert

Score

This file shows numerous signs of malicious behavior.

The score of this file is 3.7 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Feb. 16, 2026, 12:59 p.m. Feb. 16, 2026, 1:03 p.m. 250 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2026-02-16 11:59:23,015 [analyzer] DEBUG: Starting analyzer from: C:\tmppw5mq4
2026-02-16 11:59:23,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\nVmMdOzVHkWpPgMkwCjkSStZMZ
2026-02-16 11:59:23,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\NEBRnfjgevgNWydjUZopvGpYNqP
2026-02-16 11:59:23,233 [analyzer] DEBUG: Started auxiliary module Curtain
2026-02-16 11:59:23,233 [analyzer] DEBUG: Started auxiliary module DbgView
2026-02-16 11:59:23,640 [analyzer] DEBUG: Started auxiliary module Disguise
2026-02-16 11:59:23,812 [analyzer] DEBUG: Loaded monitor into process with pid 504
2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module Human
2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2026-02-16 11:59:23,812 [analyzer] DEBUG: Started auxiliary module Reboot
2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module RecentFiles
2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module Screenshots
2026-02-16 11:59:23,890 [analyzer] DEBUG: Started auxiliary module Sysmon
2026-02-16 11:59:23,905 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2026-02-16 11:59:24,453 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Gunz.exe' with arguments '' and pid 2020
2026-02-16 11:59:25,453 [analyzer] INFO: Process with pid 2020 has terminated
2026-02-16 11:59:25,453 [analyzer] INFO: Process list is empty, terminating analysis.
2026-02-16 11:59:26,640 [analyzer] INFO: Terminating remaining processes before shutdown.
2026-02-16 11:59:26,640 [analyzer] INFO: Analysis completed.

Cuckoo Log

2026-02-16 12:59:33,553 [cuckoo.core.scheduler] INFO: Task #7456800: acquired machine win7x646 (label=win7x646)
2026-02-16 12:59:33,567 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.206 for task #7456800
2026-02-16 12:59:34,057 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3532414 (interface=vboxnet0, host=192.168.168.206)
2026-02-16 13:01:56,549 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x646
2026-02-16 13:01:57,277 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x646 to vmcloak
2026-02-16 13:03:07,447 [cuckoo.core.guest] INFO: Starting analysis #7456800 on guest (id=win7x646, ip=192.168.168.206)
2026-02-16 13:03:08,467 [cuckoo.core.guest] DEBUG: win7x646: not ready yet
2026-02-16 13:03:13,731 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x646, ip=192.168.168.206)
2026-02-16 13:03:15,578 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x646, ip=192.168.168.206, monitor=latest, size=6660546)
2026-02-16 13:03:18,611 [cuckoo.core.resultserver] DEBUG: Task #7456800: live log analysis.log initialized.
2026-02-16 13:03:19,372 [cuckoo.core.resultserver] DEBUG: Task #7456800 is sending a BSON stream
2026-02-16 13:03:20,648 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'shots/0001.jpg'
2026-02-16 13:03:20,696 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 133515
2026-02-16 13:03:22,169 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'curtain/1771239566.53.curtain.log'
2026-02-16 13:03:22,173 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 36
2026-02-16 13:03:22,394 [cuckoo.core.resultserver] DEBUG: Task #7456800: File upload for 'sysmon/1771239566.64.sysmon.xml'
2026-02-16 13:03:22,574 [cuckoo.core.resultserver] DEBUG: Task #7456800 uploaded file length: 49922
2026-02-16 13:03:22,775 [cuckoo.core.resultserver] DEBUG: Task #7456800 had connection reset for <Context for LOG>
2026-02-16 13:03:24,275 [cuckoo.core.guest] INFO: win7x646: analysis completed successfully
2026-02-16 13:03:24,324 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2026-02-16 13:03:24,418 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2026-02-16 13:03:25,725 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x646 to path /srv/cuckoo/cwd/storage/analyses/7456800/memory.dmp
2026-02-16 13:03:25,737 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x646
2026-02-16 13:03:34,139 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.206 for task #7456800
2026-02-16 13:03:34,922 [cuckoo.core.scheduler] DEBUG: Released database task #7456800
2026-02-16 13:03:34,977 [cuckoo.core.scheduler] INFO: Task #7456800: analysis procedure completed

Signatures

Yara rules detected for file (2 events)
description Possibly employs anti-virtualization techniques rule vmdetect
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 events)
section
section .themida
section .boot
Foreign language identified in PE resource (8 events)
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_ICON language LANG_KOREAN filetype Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m sublanguage SUBLANG_KOREAN offset 0x04711548 size 0x00000468
name RT_GROUP_ICON language LANG_KOREAN filetype Targa image data - Map 32 x 17077 x 1 +1 sublanguage SUBLANG_KOREAN offset 0x047119c0 size 0x0000005a
name RT_VERSION language LANG_KOREAN filetype data sublanguage SUBLANG_KOREAN offset 0x04711a2c size 0x000002cc
The binary likely contains encrypted or compressed data indicative of a packer (7 events)
section {u'size_of_data': u'0x001a6000', u'virtual_address': u'0x00001000', u'entropy': 7.980702387347508, u'name': u' ', u'virtual_size': u'0x003c0080'} entropy 7.98070238735 description A section with a high entropy has been found
section {u'size_of_data': u'0x0003a600', u'virtual_address': u'0x003c2000', u'entropy': 7.955879635486761, u'name': u' ', u'virtual_size': u'0x000a2c2c'} entropy 7.95587963549 description A section with a high entropy has been found
section {u'size_of_data': u'0x00011400', u'virtual_address': u'0x00465000', u'entropy': 7.963810242802644, u'name': u' ', u'virtual_size': u'0x01a23104'} entropy 7.9638102428 description A section with a high entropy has been found
section {u'size_of_data': u'0x01fce800', u'virtual_address': u'0x01e8a000', u'entropy': 7.986234831427264, u'name': u' ', u'virtual_size': u'0x027def60'} entropy 7.98623483143 description A section with a high entropy has been found
section {u'size_of_data': u'0x00023800', u'virtual_address': u'0x04669000', u'entropy': 7.971343784827258, u'name': u' ', u'virtual_size': u'0x00079d92'} entropy 7.97134378483 description A section with a high entropy has been found
section {u'size_of_data': u'0x0030de00', u'virtual_address': u'0x04bf4000', u'entropy': 7.941484974590594, u'name': u'.boot', u'virtual_size': u'0x0030de00'} entropy 7.94148497459 description A section with a high entropy has been found
entropy 0.995198538639 description Overall entropy of this PE file is high
File has been identified by one AntiVirus engine on VirusTotal as malicious (1 event)
Bkav W32.AIDetectMalware
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.