| File name: | WickedR6.rar |
| Full analysis: | https://app.any.run/tasks/766a5a06-fd6c-4046-bac5-ee027b25d796 |
| Verdict: | Malicious activity |
| Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
| Analysis date: | June 01, 2025, 02:13:38 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 7637D921CEE677D4E4635B3010734A32 |
| SHA1: | B55B6AFFE9EE508C3478536AA8884169EDA10B59 |
| SHA256: | EB46847E75D84B358A4B872B3840305665BE9AB7DAF8F18918FEA6BC0CDCDF4A |
| SSDEEP: | 98304:tIOFCuVgZpyDrhk5C7Urfgg722KzKPhp10LONs08apZdkewP/zqpNZBjiAIx2oL9:ntL2V3Wpqy5 |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
| FileVersion: | RAR v5 |
|---|---|
| CompressedSize: | 1121400 |
| UncompressedSize: | 4719616 |
| OperatingSystem: | Win32 |
| ArchivedFileName: | Wicked R6/spoofer.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 132 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 468 | C:\WINDOWS\system32\svchost.exe -k DcomLaunch -p -s LSM | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | timeout 6 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 648 | "C:\Program Files\Microsoft Update Health Tools\uhssvc.exe" | C:\Program Files\Microsoft Update Health Tools\uhssvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Update Health Service Version: 10.0.19041.3626 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 756 | C:\WINDOWS\system32\lsass.exe | C:\Windows\System32\lsass.exe | wininit.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Local Security Authority Process Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 860 | C:\WINDOWS\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: LOCAL SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 956 | "ctfmon.exe" | C:\Windows\System32\ctfmon.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: CTF Loader Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 960 | C:\WINDOWS\system32\sc.exe stop eventlog | C:\Windows\System32\sc.exe | — | Application.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 1051 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1036 | C:\Windows\System32\RuntimeBroker.exe -Embedding | C:\Windows\System32\RuntimeBroker.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Runtime Broker Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1044 | C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s gpsvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6036) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (6036) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (956) ctfmon.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Input\TypingInsights |
| Operation: | write | Name: | Insights |
Value: 02000000071DE8C131CC8360A3D6D9C1330A686B165ABA2E235F5A5C | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: 60B73B6800000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000070346 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (6036) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6036) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6036) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1852 | Wicked R6.exe | C:\Users\admin\AppData\Local\Temp\Applications.exe | executable | |
MD5:7BAB53A21E99B5BDF183074D0CF31C4F | SHA256:AC532262429C8915526AF3AE640E9A742BF2DE4EAFBE321314FC2B51EE83E27E | |||
| 1772 | svchost.exe | C:\Windows\Prefetch\UPFC.EXE-BDDF79D6.pf | binary | |
MD5:9CFDAD5CC6F4E46480677F142F898A27 | SHA256:7DFEF0B79DF985C6680B9111E2BC263F7A0A0267D7DF079DF1EA8FC9E76447B5 | |||
| 1852 | Wicked R6.exe | C:\Users\admin\AppData\Local\Temp\UR.exe | executable | |
MD5:ACF8907CE64638007FB5514265812C67 | SHA256:9FE5FB74600E204A4739A0ED262F16AB6C7EB9F970F61D6315A8E5010F9BC3D4 | |||
| 1772 | svchost.exe | C:\Windows\Prefetch\WINRAR.EXE-94E7D80C.pf | binary | |
MD5:25971C316ED8CEDFD09337634F5A700B | SHA256:63CF0B1873ED924B06C2BFF58198FE225309B9D3E3E22017B95378B92B766D6E | |||
| 1260 | svchost.exe | C:\Windows\System32\Tasks\Microsoft\Windows\WindowsUpdate\RUXIM\PLUGScheduler | xml | |
MD5:1E0FD17505DF7FDD52708C59FCD5284C | SHA256:B374CE865F05A467798DE01B77F9AEEA861325CF274390D4C06753E77CDA564D | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 1772 | svchost.exe | C:\Windows\Prefetch\HOST.EXE-F5D74C61.pf | binary | |
MD5:5CE99A092289F60CAFC3B5937A86656D | SHA256:5EB2EC393E223B44D12DCFAEBDD6C56F8B409EA998430D230F56DECDB363FDBD | |||
| 1772 | svchost.exe | C:\Windows\Prefetch\APPLICATION.EXE-248E1482.pf | binary | |
MD5:4D7D7112FEBBBC4BEFCA73108E5DFD2D | SHA256:76B427C5BB1C30F0369C73044683BC3F638611A0E3AF371365BF292994A1C2CC | |||
| 1852 | Wicked R6.exe | C:\Users\admin\AppData\Local\Temp\Application.exe | executable | |
MD5:3DDF5FCE992B391E6C523FAEFCFDE2F2 | SHA256:6924FBBFFE66F52385926DCCFD5BDEA19531282E3BD7EF85F0093EBB658ED49C | |||
| 1772 | svchost.exe | C:\Windows\Prefetch\SPPEXTCOMOBJ.EXE-BB03B3D6.pf | binary | |
MD5:EB523F1D0A859B4CFC8081CEDF3E35D4 | SHA256:AC030967B897E3EC258B40669A7F88C84017B04A6E20A5638A46FB3BC6DA242A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
8032 | RUXIMICS.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
8032 | RUXIMICS.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 401 | 149.154.167.99:443 | https://api.telegram.org/bot7575818475:AAEcwXbcuoIY9iIwpSLG717y9bzz3yuU7dc/sendDocument | unknown | binary | 58 b | whitelisted |
— | — | GET | 200 | 172.67.25.94:443 | https://pastebin.com/raw/FAce9mqZ | unknown | text | 46 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | GET | 200 | 104.22.68.199:443 | https://pastebin.com/raw/FAce9mqZ | unknown | text | 46 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 401 | 149.154.167.99:443 | https://api.telegram.org/bot7575818475:AAEcwXbcuoIY9iIwpSLG717y9bzz3yuU7dc/sendDocument | unknown | binary | 58 b | whitelisted |
— | — | POST | 401 | 149.154.167.99:443 | https://api.telegram.org/bot7575818475:AAEcwXbcuoIY9iIwpSLG717y9bzz3yuU7dc/sendDocument | unknown | binary | 58 b | whitelisted |
— | — | GET | 200 | 104.22.69.199:443 | https://pastebin.com/raw/FAce9mqZ | unknown | text | 46 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
8032 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
8032 | RUXIMICS.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
8032 | RUXIMICS.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
1472 | Applications.exe | 104.22.69.199:443 | pastebin.com | CLOUDFLARENET | — | whitelisted |
1472 | Applications.exe | 149.154.167.220:443 | api.telegram.org | Telegram Messenger Inc | GB | whitelisted |
7048 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4976 | dialer.exe | 46.4.28.18:443 | pool.hashvault.pro | Hetzner Online GmbH | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
pastebin.com |
| whitelisted |
api.telegram.org |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
pool.hashvault.pro |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Online Pastebin Text Storage |
1472 | Applications.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
2196 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
1472 | Applications.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |
1472 | Applications.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Attempt to exfiltrate via Telegram |
— | — | A Network Trojan was detected | ET HUNTING PNG in HTTP POST (Outbound) |
2196 | svchost.exe | Crypto Currency Mining Activity Detected | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) |
8164 | svchost.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
8164 | svchost.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |
2196 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |