File name:

Radmin_Server_3.5.2.1_RU.msi

Full analysis: https://app.any.run/tasks/f7c9cf49-7ad4-4cfb-b899-f8eb4c695391
Verdict: Malicious activity
Analysis date: January 21, 2020, 14:33:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Radmin Server 3.5.2 installation package, Comments: This installer contains the logic and data to install Radmin Server 3.5.2, Keywords: Installer,MSI,Database, Subject: Radmin Server 3.5.2, Author: Famatech, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Revision Number: {BBD285CD-D1FE-41B1-B6B4-7FF7C27F553B}, Last Saved Time/Date: Wed Dec 13 16:04:58 2017, Create Time/Date: Wed Dec 13 16:04:58 2017, Last Printed: Wed Dec 13 16:04:58 2017, Code page: 0, Template: Intel;0,1033,1049
MD5:

9FC37B651AAAA8D9A822BD00C56CA3F6

SHA1:

AF2AFB71A99D350F709C8B98AAAE20E21B9DCBD0

SHA256:

083E7911712589E68084C87C6A843BD66D67CF0EAD499761D6262CFD14312122

SSDEEP:

98304:N4Yy6osoYmHAMoHIQ2MRZQTgMbL1dM3UXqNw+cCWegOmCnGuuY:NPdoY9HIQJRad1sUXqG+cCxgOmCnGE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • rsetup.exe (PID: 2328)
      • rsetup.exe (PID: 2696)
      • rsetup.exe (PID: 3036)
      • RServer3.exe (PID: 272)
      • FamItrfc.Exe (PID: 3748)
      • FamItrfc.Exe (PID: 1528)
      • rsl.exe (PID: 1596)
      • rserver3.exe (PID: 2060)
      • rserver3.exe (PID: 408)
    • Loads dropped or rewritten executable

      • FamItrfc.Exe (PID: 3748)
      • RServer3.exe (PID: 272)
      • FamItrfc.Exe (PID: 1528)
      • rserver3.exe (PID: 408)
  • SUSPICIOUS

    • Executed as Windows Service

      • vssvc.exe (PID: 284)
      • RServer3.exe (PID: 272)
    • Executable content was dropped or overwritten

      • MsiExec.exe (PID: 3272)
      • msiexec.exe (PID: 3984)
      • rsetup.exe (PID: 2696)
      • DrvInst.exe (PID: 2816)
      • DrvInst.exe (PID: 2136)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 3984)
      • DrvInst.exe (PID: 2816)
      • DrvInst.exe (PID: 2136)
      • RServer3.exe (PID: 272)
    • Executed via COM

      • DrvInst.exe (PID: 2816)
      • DrvInst.exe (PID: 2136)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2816)
      • DrvInst.exe (PID: 2136)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2816)
      • DrvInst.exe (PID: 2136)
    • Uses NETSH.EXE for network configuration

      • MsiExec.exe (PID: 3768)
    • Application launched itself

      • FamItrfc.Exe (PID: 3748)
  • INFO

    • Searches for installed software

      • msiexec.exe (PID: 3984)
    • Application launched itself

      • msiexec.exe (PID: 3984)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 284)
    • Creates files in the program directory

      • msiexec.exe (PID: 3984)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 3768)
      • MsiExec.exe (PID: 1584)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: DavidHacker
Words: -
Title: Radmin Server 3.5.2 installation package
Comments: This installer contains the logic and data to install Radmin Server 3.5.2
Keywords: Installer,MSI,Database
Subject: Radmin Server 3.5.2
Author: Famatech
Security: Password protected
Pages: 200
Software: InstallShield? 12 - Professional Edition 12.0
RevisionNumber: {BBD285CD-D1FE-41B1-B6B4-7FF7C27F553B}
ModifyDate: 2017:12:13 16:04:58
CreateDate: 2017:12:13 16:04:58
LastPrinted: 2017:12:13 16:04:58
CodePage: Unknown (0)
Template: Intel;0,1033,1049
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
18
Malicious processes
7
Suspicious processes
3

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe msiexec.exe vssvc.exe no specs msiexec.exe no specs msiexec.exe no specs rsetup.exe no specs rsetup.exe drvinst.exe drvinst.exe netsh.exe no specs rsetup.exe no specs rserver3.exe famitrfc.exe no specs famitrfc.exe no specs rsl.exe no specs rserver3.exe no specs rserver3.exe

Process information

PID
CMD
Path
Indicators
Parent process
272"C:\Windows\system32\rserver30\RServer3.exe" /serviceC:\Windows\system32\rserver30\RServer3.exe
services.exe
User:
SYSTEM
Company:
Famatech Corp.
Integrity Level:
SYSTEM
Description:
Radmin Server
Exit code:
0
Version:
3, 5, 2, 0
Modules
Images
c:\windows\system32\rserver30\rserver3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
284C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
408"C:\Windows\System32\rserver30\rserver3.exe" /setupC:\Windows\System32\rserver30\rserver3.exe
rsl.exe
User:
admin
Company:
Famatech Corp.
Integrity Level:
HIGH
Description:
Radmin Server
Exit code:
1
Version:
3, 5, 2, 0
Modules
Images
c:\windows\system32\rserver30\rserver3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
1528"C:\Windows\system32\rserver30\FamItrfc.Exe"C:\Windows\system32\rserver30\FamItrfc.ExeFamItrfc.Exe
User:
admin
Company:
Famatech Corp.
Integrity Level:
MEDIUM
Description:
Radmin component
Exit code:
0
Version:
3,5,2,1205
Modules
Images
c:\windows\system32\rserver30\famitrfc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rserver30\winlpcdl.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1584C:\Windows\system32\MsiExec.exe -Embedding 81BACFC98CB4F5328188312422BBDC8EC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1596C:\Windows\system32\rserver30\rsl.exe /setupC:\Windows\system32\rserver30\rsl.exemsiexec.exe
User:
admin
Company:
Famatech Corp.
Integrity Level:
MEDIUM
Description:
Radmin Server component
Exit code:
1
Version:
3, 5, 2, 0
Modules
Images
c:\windows\system32\rserver30\rsl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1740"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Desktop\Radmin_Server_3.5.2.1_RU.msi"C:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2060"C:\Windows\System32\rserver30\rserver3.exe" /setupC:\Windows\System32\rserver30\rserver3.exersl.exe
User:
admin
Company:
Famatech Corp.
Integrity Level:
MEDIUM
Description:
Radmin Server
Exit code:
3221226540
Version:
3, 5, 2, 0
Modules
Images
c:\windows\system32\rserver30\rserver3.exe
c:\systemroot\system32\ntdll.dll
2136DrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem4.inf" "mirrorv3.inf:Mirror.Mfg:mirrorv3:3.0.0.0:radmin_mirror_v3" "60bbf019f" "0000052C" "000005E0" "000005E4"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2328"C:\Users\admin\AppData\Local\Temp\{1B704FD1-C00F-482F-8997-82F2F19E10E7}\rsetup.exe" /stopC:\Users\admin\AppData\Local\Temp\{1B704FD1-C00F-482F-8997-82F2F19E10E7}\rsetup.exeMsiExec.exe
User:
SYSTEM
Company:
Famatech Corp.
Integrity Level:
SYSTEM
Description:
Radmin Setup Helper
Exit code:
1
Version:
3, 5, 2, 0
Modules
Images
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msisip.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\shlwapi.dll
Total events
1 241
Read events
766
Write events
462
Delete events
13

Modification events

(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\p2pcollab.dll,-8042
Value:
Peer to Peer Trust
(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\qagentrt.dll,-10
Value:
System Health Authentication
(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dnsapi.dll,-103
Value:
Domain Name System (DNS) Server Trust
(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\System32\fveui.dll,-843
Value:
BitLocker Drive Encryption
(PID) Process:(1740) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\System32\fveui.dll,-844
Value:
BitLocker Data Recovery Agent
(PID) Process:(3984) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000CA7B44C567D0D501900F0000AC0F0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3984) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000CA7B44C567D0D501900F0000AC0F0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3984) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
33
(PID) Process:(3984) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
400000000000000056028CC567D0D501900F0000AC0F0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
37
Suspicious files
20
Text files
130
Unknown types
13

Dropped files

PID
Process
Filename
Type
1740msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIAE5B.tmp
MD5:
SHA256:
1740msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIAED9.tmp
MD5:
SHA256:
3984msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3984msiexec.exeC:\Windows\Installer\39ed1a.msi
MD5:
SHA256:
3984msiexec.exeC:\Windows\Installer\MSIF1AD.tmp
MD5:
SHA256:
3984msiexec.exeC:\Users\admin\AppData\Local\Temp\~DF92213F09152F8249.TMP
MD5:
SHA256:
284vssvc.exeC:
MD5:
SHA256:
3984msiexec.exeC:\Windows\Installer\MSIF325.tmp
MD5:
SHA256:
3984msiexec.exeC:\Windows\Installer\MSIF4CE.tmp
MD5:
SHA256:
3984msiexec.exeC:\Windows\Installer\MSIF54C.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
RServer3.exe
%n%n%n%n%n%n%n%n%n
rserver3.exe
%n%n%n%n%n%n%n%n%n