| File name: | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459 |
| Full analysis: | https://app.any.run/tasks/e2645e86-29d3-4279-8022-76530db094ab |
| Verdict: | Malicious activity |
| Analysis date: | May 15, 2025, 17:15:07 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | D95C21043D6A37A4959D03824BBEF2DF |
| SHA1: | 4BD2B200D8A77BCCAEFE517E1F154C688619EAD0 |
| SHA256: | 0C2043E1006B52CA4F7E7485D7167AEE4A49C2AD5E3CB0555AC36CE2780868E1 |
| SSDEEP: | 6144:N16wN91+AQv9PLHJFXmsDDdtcyw/qjBZLRbkS7Bx:qw9WvlzJFXmMDAy9j/NbkS7L |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:04:25 08:54:15+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.43 |
| CodeSize: | 179712 |
| InitializedDataSize: | 78336 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xfc0f |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4112 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5392 -s 368 | C:\Windows\SysWOW64\WerFault.exe | — | notepad.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4740 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5608 -s 392 | C:\Windows\SysWOW64\WerFault.exe | — | notepad.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5392 | "C:\Windows\System32\notepad.exe" | C:\Windows\SysWOW64\notepad.exe | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 3221225477 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5556 | "C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe" | C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 5588 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5596 | C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 5608 | "C:\Windows\System32\notepad.exe" | C:\Windows\SysWOW64\notepad.exe | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 3221225477 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5556) Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | ' |
Value: C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | |||
| (PID) Process: | (5596) Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | ' |
Value: C:\Users\admin\Desktop\Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4740 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_notepad.exe_826b242e421c7306d8e5ad3188fb14f57a1ab2f_28b0c9c3_ca0a2339-3f4b-4865-b0b0-efbee86c3d9a\Report.wer | — | |
MD5:— | SHA256:— | |||
| 4112 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_notepad.exe_3cb42df376b9fb4b1a8d37879b5964759e290_28b0c9c3_3d4409b9-1b89-4099-a331-611956abc034\Report.wer | — | |
MD5:— | SHA256:— | |||
| 4112 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERF08C.tmp.dmp | binary | |
MD5:0D47CC4DB765AEEC3C5E4A5D8FED8D84 | SHA256:7272F799BF9B0468A6E009E1B170E964483BB61DF11FE308602D6AE175770E0E | |||
| 4740 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE3D.tmp.WERInternalMetadata.xml | binary | |
MD5:B44012EFB520BAED1FF61B294C691494 | SHA256:29A4DA0A5AF52BCF47304F7B1F448AF7D81A477F5A3A74B3D25B725C8C95DF61 | |||
| 5556 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | C:\Users\admin\Desktop\client_log.txt | text | |
MD5:E118C6E41309DE41562289B3C2F6C3C8 | SHA256:97019F244487315E0B1332E0BA90C5DE0CB27DFBA46F9A748BD75A72DDAB74D1 | |||
| 4740 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\notepad.exe.5608.dmp | binary | |
MD5:893CE6DC987D42217B0A70BF076BD6D5 | SHA256:EC8EC3C37AF572C9E2B97E69F5779D9292DADE0AD7BDF4956841CDC345D31D23 | |||
| 4112 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0CB.tmp.WERInternalMetadata.xml | binary | |
MD5:7A8CFC00AB89D06160695BDCDB81BFC6 | SHA256:9DCB89640F37C18F8DFDE07B9BB59995A72240D7E1D7F6EE0BB6D53693FF69CE | |||
| 4740 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD52.tmp.dmp | binary | |
MD5:1E70670172E834B3A838216CAD6CF62A | SHA256:013BA81D3480CCFF7E3E14B24DC504DB8825939142AB235C672BFBBABCB4D108 | |||
| 4740 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEBB.tmp.xml | xml | |
MD5:758B7B63C337F358664D6FF98B0B5471 | SHA256:FD284FB738D3BC08845AE7DBC9627754D01A0802666192E8745D1E60F30875B1 | |||
| 4112 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0EC.tmp.xml | xml | |
MD5:21F40F1841C9D4DF7FE462D33F6A3D9F | SHA256:6FEAD8D1825C2053DBDB982BC8BB8E05EC3322945098E59C918BFF5941375970 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.48.23.191:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 23.48.23.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 23.48.23.139:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
5640 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.190.160.5:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.5:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 23.48.23.191:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5556 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | 172.67.74.152:443 | api.ipify.org | CLOUDFLARENET | US | shared |
2104 | svchost.exe | 69.192.161.161:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5556 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | 104.26.9.44:443 | ipapi.co | CLOUDFLARENET | US | shared |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
api.ipify.org |
| shared |
www.microsoft.com |
| whitelisted |
ipapi.co |
| shared |
iamnotarobot.sbs |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5556 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Potential Corporate Privacy Violation | ET INFO Possible IP Check api.ipify.org |
2196 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |
5556 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (ipapi .co in DNS lookup) |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup api.ipify.org |
— | — | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org) |
5596 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Potential Corporate Privacy Violation | ET INFO Possible IP Check api.ipify.org |
5596 | Sigmanly_0c9e856ed44e2cb420ffae5bf6067b31494fd6495cc2b7ea9cfdb13bcce98459.exe | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup api.ipify.org |
— | — | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org) |