File name:

virus.msi

Full analysis: https://app.any.run/tasks/5d86a2d0-5673-4fac-9d2e-6ed83fb5afa8
Verdict: Malicious activity
Threats:

Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes.

Analysis date: March 20, 2025, 23:07:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
rhadamanthys
stealer
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Amie, Author: Lear Selfdoubt, Keywords: Installer, Comments: This installer database contains the logic and data required to install Amie., Template: Intel;1033, Revision Number: {4B7B806E-9D2F-4C92-B8A8-F6EF9328004B}, Create Time/Date: Wed Mar 19 17:36:28 2025, Last Saved Time/Date: Wed Mar 19 17:36:28 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
MD5:

EBD426FFF824E942A20FB36DC9CAB5D7

SHA1:

8EAEB4479249F887BE1A02C63A80D06F43F86EEC

SHA256:

08C5A95DA273E3ADDF4EB0F456B31FC96DCA40FF571039F066D1FF9B8598A758

SSDEEP:

98304:17hd8VIoQidkKI0yS/s/WaWEeu2u7ttIxU60ouSlOxBlFz2lhP+Rhpso4YzRotsM:+R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RHADAMANTHYS mutex has been found

      • MSBuild.exe (PID: 7596)
      • svchost.exe (PID: 7692)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 7196)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6456)
      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 4164)
    • Executable content was dropped or overwritten

      • AMCB.exe (PID: 2108)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Starts itself from another location

      • AMCB.exe (PID: 2108)
    • Starts CMD.EXE for commands execution

      • AMCB.exe (PID: 4228)
    • The process checks if it is being run in the virtual environment

      • svchost.exe (PID: 7692)
    • Connects to unusual port

      • svchost.exe (PID: 7692)
  • INFO

    • The sample compiled with english language support

      • msiexec.exe (PID: 6456)
      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Reads the computer name

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
      • AMCB.exe (PID: 4228)
      • MSBuild.exe (PID: 7596)
    • Checks supported languages

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
      • MSBuild.exe (PID: 7596)
      • AMCB.exe (PID: 4228)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 4164)
      • AMCB.exe (PID: 2108)
    • Manages system restore points

      • SrTasks.exe (PID: 7144)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 4164)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 4164)
    • Manual execution by a user

      • svchost.exe (PID: 7692)
      • svchost.exe (PID: 7836)
    • Create files in a temporary directory

      • AMCB.exe (PID: 4228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Amie
Author: Lear Selfdoubt
Keywords: Installer
Comments: This installer database contains the logic and data required to install Amie.
Template: Intel;1033
RevisionNumber: {4B7B806E-9D2F-4C92-B8A8-F6EF9328004B}
CreateDate: 2025:03:19 17:36:28
ModifyDate: 2025:03:19 17:36:28
Pages: 500
Words: 10
Software: WiX Toolset (4.0.0.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
14
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe vssvc.exe no specs sppextcomobj.exe no specs slui.exe no specs srtasks.exe no specs conhost.exe no specs amcb.exe amcb.exe no specs cmd.exe no specs conhost.exe no specs #RHADAMANTHYS msbuild.exe no specs #RHADAMANTHYS svchost.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2108"C:\Users\admin\AppData\Local\Gowan\AMCB.exe"C:\Users\admin\AppData\Local\Gowan\AMCB.exe
msiexec.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
AOMEI Cloud
Exit code:
0
Version:
7.0.0
Modules
Images
c:\users\admin\appdata\local\gowan\amcb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2692\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4164C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4228C:\Users\admin\AppData\Roaming\xwservice_dbg\AMCB.exeC:\Users\admin\AppData\Roaming\xwservice_dbg\AMCB.exeAMCB.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
AOMEI Cloud
Exit code:
1
Version:
7.0.0
Modules
Images
c:\users\admin\appdata\roaming\xwservice_dbg\amcb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5776C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeAMCB.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6456"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\virus.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7144C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7196C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7488C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
3 736
Read events
3 461
Write events
257
Delete events
18

Modification events

(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000009AF707E5EC99DB01441000000C1C0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000009AF707E5EC99DB01441000000C1C0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000092B556E5EC99DB01441000000C1C0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000092B556E5EC99DB01441000000C1C0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000AB695BE5EC99DB01441000000C1C0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000001D9462E5EC99DB01441000000C1C0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
48000000000000000ABAE5E5EC99DB01441000000C1C0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000004C81EAE5EC99DB0144100000AC1C0000E80300000100000000000000000000000E7DD4C63EF0AF41813FA51E6657111200000000000000000000000000000000
(PID) Process:(7196) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000156BF6E5EC99DB011C1C0000381C0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
26
Suspicious files
22
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
4164msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
4164msiexec.exeC:\Windows\Installer\1103c6.msi
MD5:
SHA256:
4164msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{c6d47d0e-f03e-41af-813f-a51e66571112}_OnDiskSnapshotPropbinary
MD5:93DA5F25C58EC34552CC624174E698F7
SHA256:F6254D59F613446AA6617FFC3DEDB73D45CDF77CE6ABFA33AF23E1923F484AF2
4164msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:93DA5F25C58EC34552CC624174E698F7
SHA256:F6254D59F613446AA6617FFC3DEDB73D45CDF77CE6ABFA33AF23E1923F484AF2
4164msiexec.exeC:\Windows\Installer\1103c8.msi
MD5:
SHA256:
4164msiexec.exeC:\Windows\Temp\~DFC2FAB15490E3A1A8.TMPbinary
MD5:75269CB28C6B764ECB76760C3DA89392
SHA256:095A0A06B7599DCC7B76475A0C68FB06716BAADBF0943BA7CE2C3D49BC7D246B
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\dumbbell.pkgbinary
MD5:C18C085DF7E0D001C4D4C8D843D4972C
SHA256:53D1005E66956B7FC432242F8A9E5541624502871B932BFDC0D7DE8578123EE9
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\libamcbdb.dllexecutable
MD5:B2C4CB2042F0913017B91FD89BB4CE5D
SHA256:6362536B148CEF42618FF980AA0AB6674135B958F3093EC5D6A49461E9DF10E9
4164msiexec.exeC:\Users\admin\AppData\Local\Gowan\Comn.dllexecutable
MD5:F76F5A566CBB5F561D26E7ACA841C723
SHA256:9DAAED978746AA51B30F27104D89CC16230042E41427E610A8E609CDBCFDC964
4164msiexec.exeC:\Windows\Temp\~DF13C7177946B160A2.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
35
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7416
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
184.24.77.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1672
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1672
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.24.77.24:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 184.24.77.24
  • 184.24.77.12
  • 184.24.77.34
  • 184.24.77.30
  • 184.24.77.27
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.132
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.130
  • 20.190.160.131
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

No threats detected
No debug info