File name:

kix.exe

Full analysis: https://app.any.run/tasks/015502d3-a34b-4319-b5e9-5fdc91392030
Verdict: Malicious activity
Threats:

First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.

Analysis date: August 01, 2025, 02:42:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
emmenhtal
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

5E3CD17F1C729580480FA49B80C86470

SHA1:

EAD0CC82B90C10160841FD6406542E0735CDD992

SHA256:

A83D547AC050F2D9F80888C658DCCAA04A6257E04B39DB9073E3283CF4CD7E57

SSDEEP:

12288:XaSk5uceHAmQnmRUaSk5uceHAmlMoJ7snx:5k5uceHAtn+6k5uceHAlx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • EMMENHTAL has been detected (YARA)

      • mshta.exe (PID: 7124)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • kix.exe (PID: 3000)
    • There is functionality for taking screenshot (YARA)

      • kix.exe (PID: 3000)
  • INFO

    • Reads the computer name

      • kix.exe (PID: 3000)
    • Create files in a temporary directory

      • kix.exe (PID: 3000)
    • Checks supported languages

      • kix.exe (PID: 3000)
    • Process checks computer location settings

      • kix.exe (PID: 3000)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7124)
    • Manual execution by a user

      • mspaint.exe (PID: 1468)
    • Checks proxy server information

      • mshta.exe (PID: 7124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:12:31 00:38:38+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 89600
InitializedDataSize: 118784
UninitializedDataSize: -
EntryPoint: 0x1638f
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.6.0.2712
ProductVersionNumber: 1.6.0.2712
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Djengineer14
FileDescription: Cute But No So Playful.
FileVersion: 1.1
InternalName: Kix
LegalCopyright: Copyright © 2024-2025 Djengineer14
OriginalFileName: kix.exe
PrivateBuild: 2025
ProductName: kix
ProductVersion: 1.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start kix.exe no specs #EMMENHTAL mshta.exe mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1468"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\Cute-fox[2].png"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3000"C:\Users\admin\AppData\Local\Temp\kix.exe" C:\Users\admin\AppData\Local\Temp\kix.exeexplorer.exe
User:
admin
Company:
Djengineer14
Integrity Level:
MEDIUM
Description:
Cute But No So Playful.
Version:
1.1
Modules
Images
c:\users\admin\appdata\local\temp\kix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
7124"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\kix.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\SysWOW64\mshta.exe
kix.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 519
Read events
2 485
Write events
33
Delete events
1

Modification events

(PID) Process:(7124) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7124) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7124) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3000) kix.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.hta\OpenWithProgids
Operation:writeName:htafile
Value:
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Ribbon
Operation:writeName:QatItems
Value:
<siq:customUI xmlns:siq="http://schemas.microsoft.com/windows/2009/ribbon/qat"><siq:ribbon minimized="false"><siq:qat position="0"><siq:sharedControls><siq:control idQ="siq:20002" visible="false" argument="0"/><siq:control idQ="siq:20003" visible="false" argument="0"/><siq:control idQ="siq:20004" visible="true" argument="0"/><siq:control idQ="siq:20014" visible="false" argument="0"/><siq:control idQ="siq:20017" visible="false" argument="0"/><siq:control idQ="siq:20019" visible="false" argument="0"/><siq:control idQ="siq:31001" visible="true" argument="0"/><siq:control idQ="siq:31002" visible="true" argument="0"/></siq:sharedControls></siq:qat></siq:ribbon></siq:customUI>
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List
Operation:delete keyName:(default)
Value:
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List
Operation:writeName:File1
Value:
C:\Users\admin\Desktop\Cute-fox[2].png
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:WindowPlacement
Value:
2C00000000000000010000000000000000000000FFFFFFFFFFFFFFFF7F000000470000007F04000087020000
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ShowThumbnail
Value:
0
(PID) Process:(1468) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPWidth
Value:
0
Executable files
0
Suspicious files
3
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
7124mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A2BF07A1E884A7635B036307D333FFBAbinary
MD5:157F5F105EFCD6128096BF4556C8AFEA
SHA256:D2818E73C07637BF4067A20191F287AB0900F5D25B1BC8B798957B3E17108B5E
7124mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AC46DD98AAAEE576B3999C8927F11C30der
MD5:744A48B8E9FA5D5C41506AFB2A0FC172
SHA256:259C27087B187AA5063BA647CC8213B1933683BF263FE2ADA63AAFCCA38F0455
7124mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AC46DD98AAAEE576B3999C8927F11C30binary
MD5:042838B5DBD26959D382BA747661AD8D
SHA256:7A3355404BB893215A9E4EB338C74442D295BBDC4C8B3CBC3D348F3BAF61A46F
7124mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Cute-fox[2].pngimage
MD5:70EBB88A3D811D31F94E94E8B335035A
SHA256:4EE0A72663F575A5094C91F39CE47DD79B7662F37D6D5530D2FB104C961BD4DD
7124mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A2BF07A1E884A7635B036307D333FFBAbinary
MD5:647FD920A3ED853FB0E28443565F7D54
SHA256:50CCCD19646393B9D5A0A72AD16B4AA52F4A54BEDE736F3C6F102F29E8787C74
7124mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Cute-fox[1].pngimage
MD5:70EBB88A3D811D31F94E94E8B335035A
SHA256:4EE0A72663F575A5094C91F39CE47DD79B7662F37D6D5530D2FB104C961BD4DD
3000kix.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\kix.htahtml
MD5:89B0C6E86D78091B5A9256B23714DF92
SHA256:65E032EA52223B43FE9A83852A00644036071843EC558EBBC626AD64C8B5AE8B
7124mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\1000_F_473342226_mGRsjBL2bTou0qLefOEnOMAb2lTRI0wm[1].jpgimage
MD5:E83AFFC2783B55597BA348A51C7FB821
SHA256:09DF4A14D7C566AAD3489F913D54F8ACC3FEE7E8A2156D4393451EE4D5761E4F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7124
mshta.exe
GET
200
104.18.20.213:80
http://e5.c.lencr.org/103.crl
unknown
whitelisted
7124
mshta.exe
GET
200
104.18.21.213:80
http://r11.c.lencr.org/50.crl
unknown
whitelisted
4060
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1936
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1936
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6732
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7124
mshta.exe
188.165.53.185:443
dinopixel.com
OVH SAS
FR
unknown
7124
mshta.exe
151.101.129.91:443
as1.ftcdn.net
FASTLY
US
whitelisted
7124
mshta.exe
104.18.20.213:80
e5.c.lencr.org
CLOUDFLARENET
whitelisted
7124
mshta.exe
104.18.21.213:80
e5.c.lencr.org
CLOUDFLARENET
whitelisted
4
System
192.168.100.255:138
whitelisted
4060
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
dinopixel.com
  • 188.165.53.185
unknown
as1.ftcdn.net
  • 151.101.129.91
  • 151.101.193.91
  • 151.101.65.91
  • 151.101.1.91
whitelisted
e5.c.lencr.org
  • 104.18.20.213
  • 104.18.21.213
whitelisted
r11.c.lencr.org
  • 104.18.21.213
  • 104.18.20.213
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.128
  • 40.126.31.1
  • 20.190.159.0
  • 20.190.159.75
  • 40.126.31.73
  • 40.126.31.128
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

No threats detected
No debug info