| File name: | kix.exe |
| Full analysis: | https://app.any.run/tasks/015502d3-a34b-4319-b5e9-5fdc91392030 |
| Verdict: | Malicious activity |
| Threats: | First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments. |
| Analysis date: | August 01, 2025, 02:42:31 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections |
| MD5: | 5E3CD17F1C729580480FA49B80C86470 |
| SHA1: | EAD0CC82B90C10160841FD6406542E0735CDD992 |
| SHA256: | A83D547AC050F2D9F80888C658DCCAA04A6257E04B39DB9073E3283CF4CD7E57 |
| SSDEEP: | 12288:XaSk5uceHAmQnmRUaSk5uceHAmlMoJ7snx:5k5uceHAtn+6k5uceHAlx |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:12:31 00:38:38+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 89600 |
| InitializedDataSize: | 118784 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1638f |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.6.0.2712 |
| ProductVersionNumber: | 1.6.0.2712 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Djengineer14 |
| FileDescription: | Cute But No So Playful. |
| FileVersion: | 1.1 |
| InternalName: | Kix |
| LegalCopyright: | Copyright © 2024-2025 Djengineer14 |
| OriginalFileName: | kix.exe |
| PrivateBuild: | 2025 |
| ProductName: | kix |
| ProductVersion: | 1.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1468 | "C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\Cute-fox[2].png" | C:\Windows\System32\mspaint.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Paint Exit code: 0 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3000 | "C:\Users\admin\AppData\Local\Temp\kix.exe" | C:\Users\admin\AppData\Local\Temp\kix.exe | — | explorer.exe | |||||||||||
User: admin Company: Djengineer14 Integrity Level: MEDIUM Description: Cute But No So Playful. Version: 1.1 Modules
| |||||||||||||||
| 7124 | "C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\kix.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} | C:\Windows\SysWOW64\mshta.exe | kix.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7124) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7124) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7124) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3000) kix.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.hta\OpenWithProgids |
| Operation: | write | Name: | htafile |
Value: | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Ribbon |
| Operation: | write | Name: | QatItems |
Value: <siq:customUI xmlns:siq="http://schemas.microsoft.com/windows/2009/ribbon/qat"><siq:ribbon minimized="false"><siq:qat position="0"><siq:sharedControls><siq:control idQ="siq:20002" visible="false" argument="0"/><siq:control idQ="siq:20003" visible="false" argument="0"/><siq:control idQ="siq:20004" visible="true" argument="0"/><siq:control idQ="siq:20014" visible="false" argument="0"/><siq:control idQ="siq:20017" visible="false" argument="0"/><siq:control idQ="siq:20019" visible="false" argument="0"/><siq:control idQ="siq:31001" visible="true" argument="0"/><siq:control idQ="siq:31002" visible="true" argument="0"/></siq:sharedControls></siq:qat></siq:ribbon></siq:customUI> | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List |
| Operation: | write | Name: | File1 |
Value: C:\Users\admin\Desktop\Cute-fox[2].png | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View |
| Operation: | write | Name: | WindowPlacement |
Value: 2C00000000000000010000000000000000000000FFFFFFFFFFFFFFFF7F000000470000007F04000087020000 | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View |
| Operation: | write | Name: | ShowThumbnail |
Value: 0 | |||
| (PID) Process: | (1468) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View |
| Operation: | write | Name: | BMPWidth |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7124 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A2BF07A1E884A7635B036307D333FFBA | binary | |
MD5:157F5F105EFCD6128096BF4556C8AFEA | SHA256:D2818E73C07637BF4067A20191F287AB0900F5D25B1BC8B798957B3E17108B5E | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AC46DD98AAAEE576B3999C8927F11C30 | der | |
MD5:744A48B8E9FA5D5C41506AFB2A0FC172 | SHA256:259C27087B187AA5063BA647CC8213B1933683BF263FE2ADA63AAFCCA38F0455 | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AC46DD98AAAEE576B3999C8927F11C30 | binary | |
MD5:042838B5DBD26959D382BA747661AD8D | SHA256:7A3355404BB893215A9E4EB338C74442D295BBDC4C8B3CBC3D348F3BAF61A46F | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Cute-fox[2].png | image | |
MD5:70EBB88A3D811D31F94E94E8B335035A | SHA256:4EE0A72663F575A5094C91F39CE47DD79B7662F37D6D5530D2FB104C961BD4DD | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A2BF07A1E884A7635B036307D333FFBA | binary | |
MD5:647FD920A3ED853FB0E28443565F7D54 | SHA256:50CCCD19646393B9D5A0A72AD16B4AA52F4A54BEDE736F3C6F102F29E8787C74 | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Cute-fox[1].png | image | |
MD5:70EBB88A3D811D31F94E94E8B335035A | SHA256:4EE0A72663F575A5094C91F39CE47DD79B7662F37D6D5530D2FB104C961BD4DD | |||
| 3000 | kix.exe | C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\kix.hta | html | |
MD5:89B0C6E86D78091B5A9256B23714DF92 | SHA256:65E032EA52223B43FE9A83852A00644036071843EC558EBBC626AD64C8B5AE8B | |||
| 7124 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\1000_F_473342226_mGRsjBL2bTou0qLefOEnOMAb2lTRI0wm[1].jpg | image | |
MD5:E83AFFC2783B55597BA348A51C7FB821 | SHA256:09DF4A14D7C566AAD3489F913D54F8ACC3FEE7E8A2156D4393451EE4D5761E4F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7124 | mshta.exe | GET | 200 | 104.18.20.213:80 | http://e5.c.lencr.org/103.crl | unknown | — | — | whitelisted |
7124 | mshta.exe | GET | 200 | 104.18.21.213:80 | http://r11.c.lencr.org/50.crl | unknown | — | — | whitelisted |
4060 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1936 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1936 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6732 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7124 | mshta.exe | 188.165.53.185:443 | dinopixel.com | OVH SAS | FR | unknown |
7124 | mshta.exe | 151.101.129.91:443 | as1.ftcdn.net | FASTLY | US | whitelisted |
7124 | mshta.exe | 104.18.20.213:80 | e5.c.lencr.org | CLOUDFLARENET | — | whitelisted |
7124 | mshta.exe | 104.18.21.213:80 | e5.c.lencr.org | CLOUDFLARENET | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4060 | svchost.exe | 20.190.159.23:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
dinopixel.com |
| unknown |
as1.ftcdn.net |
| whitelisted |
e5.c.lencr.org |
| whitelisted |
r11.c.lencr.org |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |