File name:

Blue Viper Cold Hack.exe

Full analysis: https://app.any.run/tasks/6030d478-d8f5-474e-820a-fa0a1bdf9d98
Verdict: Malicious activity
Threats:

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

Analysis date: January 06, 2024, 20:05:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
darkcomet
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A56BCAC2008F169C5DEA67DE5A5B3B02

SHA1:

D3EDBEE2817957DA87F6974C649B538B264CF320

SHA256:

3289160B2FEBEB4B0C2688648FAF5EB9F8BDED8F1E36934D8A280C44D314470B

SSDEEP:

12288:l9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hzL:vZ1xuVVjfFoynPaVBUR8f+kN10EBl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the login/logoff helper path in the registry

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 2304)
      • Blue Viper Cold Hack.exe (PID: 1588)
    • DARKCOMET has been detected (YARA)

      • Blue Viper Cold Hack.exe (PID: 128)
    • Changes the autorun value in the registry

      • Blue Viper Cold Hack.exe (PID: 1588)
      • Blue Viper Cold Hack.exe (PID: 2304)
    • Creates a writable file in the system directory

      • Blue Viper Cold Hack.exe (PID: 2304)
    • Creates or modifies Windows services

      • msdcsc.exe (PID: 2644)
    • Changes firewall settings

      • msdcsc.exe (PID: 2644)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 1588)
      • Blue Viper Cold Hack.exe (PID: 2304)
    • Starts CMD.EXE for commands execution

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 2304)
      • Blue Viper Cold Hack.exe (PID: 1588)
    • Start notepad (likely ransomware note)

      • Blue Viper Cold Hack.exe (PID: 128)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 2408)
      • cmd.exe (PID: 2256)
      • cmd.exe (PID: 2384)
      • cmd.exe (PID: 2056)
      • cmd.exe (PID: 1596)
      • cmd.exe (PID: 1584)
  • INFO

    • Drops the executable file immediately after the start

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 2304)
    • Reads the computer name

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 1588)
      • Blue Viper Cold Hack.exe (PID: 2304)
      • msdcsc.exe (PID: 2644)
    • Checks supported languages

      • Blue Viper Cold Hack.exe (PID: 128)
      • Blue Viper Cold Hack.exe (PID: 1588)
      • Blue Viper Cold Hack.exe (PID: 2304)
      • msdcsc.exe (PID: 2644)
    • Manual execution by a user

      • Blue Viper Cold Hack.exe (PID: 1588)
      • Blue Viper Cold Hack.exe (PID: 2304)
    • Reads the machine GUID from the registry

      • Blue Viper Cold Hack.exe (PID: 2304)
    • Starts itself from another location

      • Blue Viper Cold Hack.exe (PID: 2304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (31.9)
.scr | Windows screen saver (29.4)
.dll | Win32 Dynamic Link Library (generic) (14.8)
.exe | Win32 Executable (generic) (10.1)
.exe | Win16/32 Executable Delphi generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:06:07 17:59:53+02:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 586752
InitializedDataSize: 119296
UninitializedDataSize: -
EntryPoint: 0x8f888
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.0
ProductVersionNumber: 4.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: Remote Service Application
CompanyName: Microsoft Corp.
FileDescription: Remote Service Application
FileVersion: 1, 0, 0, 1
InternalName: MSRSAAPP
LegalCopyright: Copyright (C) 1999
OriginalFileName: MSRSAAP.EXE
ProductName: Remote Service Application
ProductVersion: 4, 0, 0, 0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
17
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #DARKCOMET blue viper cold hack.exe cmd.exe no specs cmd.exe no specs notepad.exe no specs attrib.exe no specs attrib.exe no specs blue viper cold hack.exe cmd.exe no specs cmd.exe no specs attrib.exe no specs attrib.exe no specs blue viper cold hack.exe cmd.exe no specs cmd.exe no specs attrib.exe no specs attrib.exe no specs msdcsc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" C:\Users\admin\Desktop\Blue Viper Cold Hack.exe
explorer.exe
User:
admin
Company:
Microsoft Corp.
Integrity Level:
MEDIUM
Description:
Remote Service Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\blue viper cold hack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
796attrib "C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1044attrib "C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1344attrib "C:\Users\admin\Desktop" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1584"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" +s +hC:\Windows\System32\cmd.exeBlue Viper Cold Hack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1588"C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" C:\Users\admin\Desktop\Blue Viper Cold Hack.exe
explorer.exe
User:
admin
Company:
Microsoft Corp.
Integrity Level:
MEDIUM
Description:
Remote Service Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\blue viper cold hack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1592attrib "C:\Users\admin\Desktop" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1596"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\Desktop" +s +hC:\Windows\System32\cmd.exeBlue Viper Cold Hack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1624attrib "C:\Users\admin\Desktop\Blue Viper Cold Hack.exe" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2016notepadC:\Windows\System32\notepad.exeBlue Viper Cold Hack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
1 860
Read events
1 770
Write events
90
Delete events
0

Modification events

(PID) Process:(128) Blue Viper Cold Hack.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:UserInit
Value:
C:\Windows\system32\userinit.exe,
(PID) Process:(128) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(128) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(128) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(128) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1588) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicroUpdate
Value:
C:\Windows\system32\MSDCSC\tGymst9Rcojq\msdcsc.exe
(PID) Process:(1588) Blue Viper Cold Hack.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:UserInit
Value:
C:\Windows\system32\userinit.exe,
(PID) Process:(1588) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1588) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1588) Blue Viper Cold Hack.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2304Blue Viper Cold Hack.exeC:\Windows\system32\MSDCSC\msdcsc.exeexecutable
MD5:A56BCAC2008F169C5DEA67DE5A5B3B02
SHA256:3289160B2FEBEB4B0C2688648FAF5EB9F8BDED8F1E36934D8A280C44D314470B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
128
Blue Viper Cold Hack.exe
78.163.16.186:80
Turk Telekom
TR
malicious

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info