File name:

01865966_4

Full analysis: https://app.any.run/tasks/a1541459-8d1b-4252-ac94-5a220dfa2d5a
Verdict: Malicious activity
Analysis date: March 04, 2020, 01:54:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: DameWare Mini Remote Control Service, Author: DameWare Development, Keywords: Installer, MSI, Database, Comments: This installer database contains the logic and data required to install DameWare Mini Remote Control Service., Template: ;1033, Last Saved By: Administrator, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Jun 26 22:49:40 2015, Number of Pages: 200, Number of Words: 2, Name of Creating Application: InstEd, Security: 0, Revision Number: {F1B8E228-D717-47E8-B15A-2652AFA7B611}
MD5:

753CDFE38233977074FBF56B1BE98AE7

SHA1:

766D0567189897EA60F34AF881B5567AAC713E94

SHA256:

5FE8654318E6355245B09C49B255C88BF82D7227EC2E3037B46995A6466EAABD

SSDEEP:

98304:AJPpJFByYsANuAO5OWRqxg86/nXQ8Ti1wlRhwpptc+CHxfouXfDIrVq7kJNI+Vww:sn+A9N96/jHJhV0x4Lx5I8DtZEQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Disables Windows Defender

      • dwrcs.exe (PID: 3148)
      • dwrcs.exe (PID: 2812)
    • Changes Windows auto-update feature

      • dwrcs.exe (PID: 3148)
      • dwrcs.exe (PID: 2812)
    • Loads dropped or rewritten executable

      • dwrcs.exe (PID: 3148)
      • regsvr32.exe (PID: 3924)
      • dwrcs.exe (PID: 2812)
      • DWRCST.exe (PID: 1844)
      • DWRCST.exe (PID: 604)
    • Application was dropped or rewritten from another process

      • dwrcs.exe (PID: 3148)
      • dwrcs.exe (PID: 2812)
      • DWRCST.exe (PID: 1844)
      • DWRCST.exe (PID: 604)
    • Changes the autorun value in the registry

      • dwrcs.exe (PID: 2812)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MsiExec.exe (PID: 2760)
      • dwrcs.exe (PID: 3148)
      • msiexec.exe (PID: 3404)
    • Creates files in the Windows directory

      • dwrcs.exe (PID: 3148)
      • msiexec.exe (PID: 3404)
    • Executed as Windows Service

      • dwrcs.exe (PID: 2812)
      • vssvc.exe (PID: 3180)
    • Removes files from Windows directory

      • dwrcs.exe (PID: 2812)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 3924)
    • Modifies the open verb of a shell class

      • dwrcs.exe (PID: 2812)
      • msiexec.exe (PID: 3404)
    • Creates files in the program directory

      • DWRCST.exe (PID: 1844)
      • dwrcs.exe (PID: 3148)
  • INFO

    • Searches for installed software

      • msiexec.exe (PID: 3404)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3180)
    • Application was dropped or rewritten from another process

      • MSID32C.tmp (PID: 848)
    • Application launched itself

      • msiexec.exe (PID: 3404)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2628)
      • MsiExec.exe (PID: 2760)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3404)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 3404)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: DameWare Mini Remote Control Service
Author: DameWare Development
Keywords: Installer, MSI, Database
Comments: This installer database contains the logic and data required to install DameWare Mini Remote Control Service.
Template: ;1033
LastModifiedBy: Administrator
LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2015:06:26 21:49:40
Pages: 200
Words: 2
Software: InstEd
Security: None
RevisionNumber: {F1B8E228-D717-47E8-B15A-2652AFA7B611}
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
12
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start msiexec.exe no specs msiexec.exe msiexec.exe vssvc.exe no specs msiexec.exe no specs msid32c.tmp no specs dwrcs.exe dwrcs.exe regsvr32.exe no specs msiexec.exe no specs dwrcst.exe no specs dwrcst.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
604 6129C:\Windows\dwrcs\DWRCST.exedwrcs.exe
User:
admin
Company:
SolarWinds
Integrity Level:
MEDIUM
Description:
DameWare products
Exit code:
0
Version:
12.1.0.96
Modules
Images
c:\windows\dwrcs\dwrcst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
848"C:\Windows\Installer\MSID32C.tmp" -mrc -silent -install -mirror:0 -keyboard:0 -smartcard:0 -bit:32 -sec:1j!d0F3Fx#16f3$G -dir:"C:\Windows\dwrcs\ "C:\Windows\Installer\MSID32C.tmpmsiexec.exe
User:
admin
Company:
DameWare Development LLC
Integrity Level:
MEDIUM
Description:
DWMSICLN MFC Application
Exit code:
0
Version:
7.5.6.0
Modules
Images
c:\windows\installer\msid32c.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
1844 -ConsoleLockC:\Windows\dwrcs\DWRCST.exedwrcs.exe
User:
admin
Company:
SolarWinds
Integrity Level:
MEDIUM
Description:
DameWare products
Exit code:
4294967252
Version:
12.1.0.96
Modules
Images
c:\windows\dwrcs\dwrcst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
2628C:\Windows\system32\MsiExec.exe -Embedding 34511EC922DF318EA58191B6031BC0DCC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2760C:\Windows\system32\MsiExec.exe -Embedding CE5E12DBDC2071C10E812D00D4A1DDAC CC:\Windows\system32\MsiExec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2812C:\Windows\dwrcs\dwrcs.exe -serviceC:\Windows\dwrcs\dwrcs.exe
services.exe
User:
SYSTEM
Company:
SolarWinds
Integrity Level:
SYSTEM
Description:
DameWare products
Exit code:
0
Version:
12.1.0.96
Modules
Images
c:\windows\dwrcs\dwrcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
3148C:\Windows\dwrcs\dwrcs -install -silent C:\Windows\dwrcs\dwrcs.exe
MSID32C.tmp
User:
SYSTEM
Company:
SolarWinds
Integrity Level:
SYSTEM
Description:
DameWare products
Exit code:
0
Version:
12.1.0.96
Modules
Images
c:\windows\dwrcs\dwrcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
3180C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3352"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\01865966_4.msi"C:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3404C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
910
Read events
559
Write events
305
Delete events
46

Modification events

(PID) Process:(3352) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3404) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000FA59E7E2C7F1D5014C0D0000100A0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3404) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000FA59E7E2C7F1D5014C0D0000100A0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3404) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
34
(PID) Process:(3404) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4000000000000000CCA352E3C7F1D5014C0D0000100A0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3404) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000806857E3C7F1D5014C0D0000C8030000E80300000100000000000000000000000A16C92642769342B3940B8233E5C4A10000000000000000
(PID) Process:(3180) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000AADD6CE3C7F1D5016C0C0000CC060000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3180) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000AADD6CE3C7F1D5016C0C000094070000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3180) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000AADD6CE3C7F1D5016C0C0000280B0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3180) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000AADD6CE3C7F1D5016C0C0000880D0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
Executable files
25
Suspicious files
7
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
3352msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI7651.tmp
MD5:
SHA256:
3352msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI76CF.tmp
MD5:
SHA256:
3352msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI76E0.tmp
MD5:
SHA256:
3404msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3404msiexec.exeC:\Windows\Installer\a6c953.msi
MD5:
SHA256:
3404msiexec.exeC:\Windows\Installer\MSICFDC.tmp
MD5:
SHA256:
3404msiexec.exeC:\Users\admin\AppData\Local\Temp\~DF5AAF76787E6DED89.TMP
MD5:
SHA256:
3404msiexec.exeC:\Windows\Installer\MSID0C8.tmp
MD5:
SHA256:
3404msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{26c9160a-7642-4293-b394-0b8233e5c4a1}_OnDiskSnapshotPropbinary
MD5:
SHA256:
3404msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info