File name:

Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3

Full analysis: https://app.any.run/tasks/e9017025-b309-4042-97ca-be3eb8de4f82
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 15, 2025, 14:02:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
discordgrabber
generic
stealer
celestialrat
rat
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

2726145D4EF3B34D3C3A566177805C39

SHA1:

B3CDF88E64D57DAC9812564A83ACE2A22AE06828

SHA256:

2B696BA0EA5EA7F35DCD39BE430A8880034490F3D1C5F2219FED2D06376A21A3

SSDEEP:

98304:slumAQZu4BRuaxTbc6d57DlfZD0rmhDbZvqpdY6dn+CL7gAOwhGL0DWYRbihLWLu:63b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DISCORDGRABBER has been detected (YARA)

      • Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe (PID: 4988)
      • CasPol.exe (PID: 3100)
    • CELESTIALRAT has been detected (YARA)

      • CasPol.exe (PID: 3100)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • CasPol.exe (PID: 3100)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • CasPol.exe (PID: 3100)
    • There is functionality for taking screenshot (YARA)

      • CasPol.exe (PID: 3100)
    • Executable content was dropped or overwritten

      • CasPol.exe (PID: 3100)
    • Connects to unusual port

      • CasPol.exe (PID: 3100)
  • INFO

    • Checks supported languages

      • CasPol.exe (PID: 3100)
      • Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe (PID: 4988)
    • Checks proxy server information

      • slui.exe (PID: 5756)
      • CasPol.exe (PID: 3100)
    • Reads the computer name

      • CasPol.exe (PID: 3100)
    • Reads the machine GUID from the registry

      • CasPol.exe (PID: 3100)
    • Create files in a temporary directory

      • CasPol.exe (PID: 3100)
    • Reads the software policy settings

      • slui.exe (PID: 5756)
    • Creates files in the program directory

      • CasPol.exe (PID: 3100)
    • Disables trace logs

      • CasPol.exe (PID: 3100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:17 23:36:19+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 47616
InitializedDataSize: 2782208
UninitializedDataSize: -
EntryPoint: 0xb50b
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DISCORDGRABBER sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe no specs #CELESTIALRAT caspol.exe svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3100"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Framework CAS Policy Manager
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\caspol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4988"C:\Users\admin\Desktop\Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe" C:\Users\admin\Desktop\Sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\sigmanly_2b696ba0ea5ea7f35dcd39be430a8880034490f3d1c5f2219fed2d06376a21a3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5756C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 048
Read events
4 034
Write events
14
Delete events
0

Modification events

(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3100) CasPol.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
7
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\AForge.Video.dllexecutable
MD5:4A48A7428AF3F34F8A2E1DECF0723DA6
SHA256:C05B1384389765C4F5F8D36277A7871F641DF0A61BC009C3193448BA17D69103
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\SharpDX.dllexecutable
MD5:FFB4B61CC11BEC6D48226027C2C26704
SHA256:061542FF3FB36039B7BBFFDF3E07B66176B264C1DFD834A14B09C08620717303
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\SharpDX.Direct3D11.dllexecutable
MD5:98EB5BA5871ACDEAEBF3A3B0F64BE449
SHA256:D7617D926648849CBFEF450B8F48E458EE52E2793FB2251A30094B778AA8848C
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\LummaC2Govno.rarcompressed
MD5:EF2264409B3D553C2A354CB83382793A
SHA256:561B505C9FAF93CFBC2DC4BC2C570248F2B5BEB4633D68C53389D4B33B5273FD
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\SharpDX.Direct3D9.dllexecutable
MD5:934DA0E49208D0881C44FE19D5033840
SHA256:02DA4AF8CD4A8DE19D816000CAAAE885E676B9E52F136FF071A279C2B8AD34C7
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\AForge.Video.DirectShow.dllexecutable
MD5:428E5480573BDAF15EAD6BC7F973D583
SHA256:FDC8A1B52E141ED49E34B888FE2EF9989FF157EB829666F498F61949A2479B8E
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\SharpDX.DXGI.dllexecutable
MD5:2B44C70C49B70D797FBB748158B5D9BB
SHA256:3762D43C83AF69CD38C9341A927CA6BD00F6BAE8217C874D693047D6DF4705BF
3100CasPol.exeC:\Users\admin\AppData\Local\Temp\QatarLib\DotNetZip.dllexecutable
MD5:081C3E4B982EF5F2316BBDD31B324FC2
SHA256:0E52639DBDDEF74BC32F25555B193AB336E45E2F856D0424B140048C42B097AD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
89
DNS requests
4
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3100
CasPol.exe
GET
200
104.16.185.241:80
http://icanhazip.com/
unknown
whitelisted
3100
CasPol.exe
GET
200
104.16.185.241:80
http://icanhazip.com/
unknown
whitelisted
3100
CasPol.exe
GET
200
104.16.185.241:80
http://icanhazip.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3100
CasPol.exe
104.161.17.20:3333
IOFLOOD
US
unknown
4
System
192.168.100.255:137
whitelisted
3100
CasPol.exe
104.16.185.241:80
icanhazip.com
CLOUDFLARENET
whitelisted
2284
slui.exe
52.161.91.37:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5756
slui.exe
52.161.91.37:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.46
whitelisted
icanhazip.com
  • 104.16.185.241
  • 104.16.184.241
whitelisted
activation-v2.sls.microsoft.com
  • 52.161.91.37
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (icanhazip .com)
3100
CasPol.exe
Attempted Information Leak
ET INFO IP Check Domain (icanhazip. com in HTTP Host)
3100
CasPol.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3100
CasPol.exe
Attempted Information Leak
ET INFO IP Check Domain (icanhazip. com in HTTP Host)
3100
CasPol.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3100
CasPol.exe
Attempted Information Leak
ET INFO IP Check Domain (icanhazip. com in HTTP Host)
3100
CasPol.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info