File name:

virus.msi

Full analysis: https://app.any.run/tasks/5d86a2d0-5673-4fac-9d2e-6ed83fb5afa8
Verdict: Malicious activity
Threats:

Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes.

Analysis date: March 20, 2025, 23:07:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
rhadamanthys
stealer
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Amie, Author: Lear Selfdoubt, Keywords: Installer, Comments: This installer database contains the logic and data required to install Amie., Template: Intel;1033, Revision Number: {4B7B806E-9D2F-4C92-B8A8-F6EF9328004B}, Create Time/Date: Wed Mar 19 17:36:28 2025, Last Saved Time/Date: Wed Mar 19 17:36:28 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
MD5:

EBD426FFF824E942A20FB36DC9CAB5D7

SHA1:

8EAEB4479249F887BE1A02C63A80D06F43F86EEC

SHA256:

08C5A95DA273E3ADDF4EB0F456B31FC96DCA40FF571039F066D1FF9B8598A758

SSDEEP:

98304:17hd8VIoQidkKI0yS/s/WaWEeu2u7ttIxU60ouSlOxBlFz2lhP+Rhpso4YzRotsM:+R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RHADAMANTHYS mutex has been found

      • MSBuild.exe (PID: 7596)
      • svchost.exe (PID: 7692)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 7196)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6456)
      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • The process drops C-runtime libraries

      • AMCB.exe (PID: 2108)
      • msiexec.exe (PID: 4164)
    • Executable content was dropped or overwritten

      • AMCB.exe (PID: 2108)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 4164)
    • Starts itself from another location

      • AMCB.exe (PID: 2108)
    • Starts CMD.EXE for commands execution

      • AMCB.exe (PID: 4228)
    • The process checks if it is being run in the virtual environment

      • svchost.exe (PID: 7692)
    • Connects to unusual port

      • svchost.exe (PID: 7692)
  • INFO

    • The sample compiled with english language support

      • msiexec.exe (PID: 6456)
      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Reads the computer name

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
      • AMCB.exe (PID: 4228)
      • MSBuild.exe (PID: 7596)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Checks supported languages

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
      • MSBuild.exe (PID: 7596)
      • AMCB.exe (PID: 4228)
    • Manages system restore points

      • SrTasks.exe (PID: 7144)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 4164)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 4164)
    • Create files in a temporary directory

      • AMCB.exe (PID: 4228)
    • Manual execution by a user

      • svchost.exe (PID: 7692)
      • svchost.exe (PID: 7836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Amie
Author: Lear Selfdoubt
Keywords: Installer
Comments: This installer database contains the logic and data required to install Amie.
Template: Intel;1033
RevisionNumber: {4B7B806E-9D2F-4C92-B8A8-F6EF9328004B}
CreateDate: 2025:03:19 17:36:28
ModifyDate: 2025:03:19 17:36:28
Pages: 500
Words: 10
Software: WiX Toolset (4.0.0.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
14
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe vssvc.exe no specs sppextcomobj.exe no specs slui.exe no specs srtasks.exe no specs conhost.exe no specs amcb.exe amcb.exe no specs cmd.exe no specs conhost.exe no specs #RHADAMANTHYS msbuild.exe no specs #RHADAMANTHYS svchost.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2108"C:\Users\admin\AppData\Local\Gowan\AMCB.exe"C:\Users\admin\AppData\Local\Gowan\AMCB.exe
msiexec.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
AOMEI Cloud
Exit code:
0
Version:
7.0.0
Modules
Images
c:\users\admin\appdata\local\gowan\amcb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2692\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4164C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4228C:\Users\admin\AppData\Roaming\xwservice_dbg\AMCB.exeC:\Users\admin\AppData\Roaming\xwservice_dbg\AMCB.exeAMCB.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
AOMEI Cloud
Exit code:
1
Version:
7.0.0
Modules
Images
c:\users\admin\appdata\roaming\xwservice_dbg\amcb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5776C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeAMCB.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6456"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\virus.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7144C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7196C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7488C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
3 736
Read events
3 461
Write events
257
Delete events
18

Modification events

(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000009AF707E5EC99DB01441000000C1C0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000009AF707E5EC99DB01441000000C1C0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000092B556E5EC99DB01441000000C1C0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000092B556E5EC99DB01441000000C1C0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000AB695BE5EC99DB01441000000C1C0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000001D9462E5EC99DB01441000000C1C0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
48000000000000000ABAE5E5EC99DB01441000000C1C0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000004C81EAE5EC99DB0144100000AC1C0000E80300000100000000000000000000000E7DD4C63EF0AF41813FA51E6657111200000000000000000000000000000000
(PID) Process:(7196) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000156BF6E5EC99DB011C1C0000381C0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
26
Suspicious files
22
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
4164msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
4164msiexec.exeC:\Windows\Installer\1103c6.msi
MD5:
SHA256:
4164msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{c6d47d0e-f03e-41af-813f-a51e66571112}_OnDiskSnapshotPropbinary
MD5:93DA5F25C58EC34552CC624174E698F7
SHA256:F6254D59F613446AA6617FFC3DEDB73D45CDF77CE6ABFA33AF23E1923F484AF2
4164msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:93DA5F25C58EC34552CC624174E698F7
SHA256:F6254D59F613446AA6617FFC3DEDB73D45CDF77CE6ABFA33AF23E1923F484AF2
4164msiexec.exeC:\Windows\Installer\1103c8.msi
MD5:
SHA256:
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libamcbdb.dllexecutable
MD5:B2C4CB2042F0913017B91FD89BB4CE5D
SHA256:6362536B148CEF42618FF980AA0AB6674135B958F3093EC5D6A49461E9DF10E9
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libamcbconsole.dllexecutable
MD5:9EE16DB906E3AEA9ABABF666E6E0E551
SHA256:5C96BACF24EDAE65840C9DD204827A4E4A0E6418173B09837D5E065A68EBEC47
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libamct.dllexecutable
MD5:D528DD8BA8DE94C0720BA40B76AB96FD
SHA256:82DB66C5E51A84FC9669B74E82DB9EC6F32441903BDADB587FBB368BCF008268
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libcurl.dllexecutable
MD5:62DDD175D6110CD30E6095C69C736BB2
SHA256:520E56F2C21CE6D2FD761577687B33BB5B9CA96F2453FA6B1880EA1E4BDFE061
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libssl-1_1.dllexecutable
MD5:CDBF8CD36924FFB81B19487746F7F18E
SHA256:0813C77DF688B39F26BAD0BE2B3E4AFDE13E97D9A1EBCBDB3B1F4184218D1A57
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
35
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
184.24.77.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7416
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1672
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1672
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.24.77.24:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 184.24.77.24
  • 184.24.77.12
  • 184.24.77.34
  • 184.24.77.30
  • 184.24.77.27
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.132
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.130
  • 20.190.160.131
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

No threats detected
No debug info