URL Details

URL
http://horshinterior.online

Score

This url shows some signs of potential malicious behavior.

The score of this url is 1.4 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
URL Feb. 9, 2026, 3:01 p.m. Feb. 9, 2026, 3:02 p.m. 65 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2026-02-09 14:01:33,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptisd8w
2026-02-09 14:01:33,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\kXjPFrqxAUVPwmDbbDTojHd
2026-02-09 14:01:33,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\qVEwIWeScYdLkIfsxPmSPANNsVTSeeKd
2026-02-09 14:01:33,280 [analyzer] DEBUG: Started auxiliary module Curtain
2026-02-09 14:01:33,296 [analyzer] DEBUG: Started auxiliary module DbgView
2026-02-09 14:01:33,655 [analyzer] DEBUG: Started auxiliary module Disguise
2026-02-09 14:01:33,842 [analyzer] DEBUG: Loaded monitor into process with pid 508
2026-02-09 14:01:33,842 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2026-02-09 14:01:33,842 [analyzer] DEBUG: Started auxiliary module Human
2026-02-09 14:01:33,842 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2026-02-09 14:01:33,842 [analyzer] DEBUG: Started auxiliary module Reboot
2026-02-09 14:01:33,937 [analyzer] DEBUG: Started auxiliary module RecentFiles
2026-02-09 14:01:33,937 [analyzer] DEBUG: Started auxiliary module Screenshots
2026-02-09 14:01:33,953 [analyzer] DEBUG: Started auxiliary module Sysmon
2026-02-09 14:01:33,953 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2026-02-09 14:01:34,046 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Internet Explorer\\iexplore.exe' with arguments ['http://horshinterior.online'] and pid 1276
2026-02-09 14:01:34,203 [analyzer] DEBUG: Loaded monitor into process with pid 1276
2026-02-09 14:01:35,500 [analyzer] DEBUG: Following legitimate IE11 process: "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:2!
2026-02-09 14:01:35,608 [analyzer] INFO: Injected into process with pid 2544 and name u'iexplore.exe'
2026-02-09 14:01:35,717 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2544.
2026-02-09 14:01:35,890 [analyzer] INFO: Added new file to list with pid 1276 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{757A05E3-05B7-11F1-B305-78589F4D5B44}.dat
2026-02-09 14:01:35,921 [analyzer] DEBUG: Loaded monitor into process with pid 2544
2026-02-09 14:01:35,953 [analyzer] INFO: Added new file to list with pid 1276 and path C:\Users\Administrator\AppData\Local\Temp\~DFA20292E5A9C274D7.TMP
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-02-09 14:01:36,108 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-02-09 14:01:36,125 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-02-09 14:01:36,421 [analyzer] INFO: Added new file to list with pid 1276 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{757A05E5-05B7-11F1-B305-78589F4D5B44}.dat
2026-02-09 14:01:36,453 [analyzer] INFO: Added new file to list with pid 1276 and path C:\Users\Administrator\AppData\Local\Temp\~DFE2180E6C799A00FA.TMP
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-02-09 14:01:36,812 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-02-09 14:01:36,828 [analyzer] INFO: Added new file to list with pid 2544 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P7OC751U\dnserror[1]
2026-02-09 14:01:36,875 [analyzer] INFO: Added new file to list with pid 2544 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IWUWK4DN\NewErrorPageTemplate[1]
2026-02-09 14:01:36,875 [analyzer] INFO: Added new file to list with pid 2544 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TPLTKY5I\errorPageStrings[1]
2026-02-09 14:01:36,890 [analyzer] INFO: Added new file to list with pid 2544 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P7OC751U\httpErrorPagesScripts[1]
2026-02-09 14:02:27,250 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2026-02-09 14:02:27,437 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1276.
2026-02-09 14:02:27,515 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2544.
2026-02-09 14:02:27,750 [analyzer] INFO: Terminating remaining processes before shutdown.
2026-02-09 14:02:27,750 [lib.api.process] INFO: Successfully terminated process with pid 1276.
2026-02-09 14:02:27,765 [lib.api.process] INFO: Successfully terminated process with pid 2544.
2026-02-09 14:02:27,796 [analyzer] WARNING: File at path u'c:\\users\\administrator\\appdata\\local\\temp\\~dfe2180e6c799a00fa.tmp' does not exist, skip.
2026-02-09 14:02:27,812 [analyzer] WARNING: File at path u'c:\\users\\administrator\\appdata\\local\\temp\\~dfa20292e5a9c274d7.tmp' does not exist, skip.
2026-02-09 14:02:27,812 [analyzer] INFO: Analysis completed.

Cuckoo Log

2026-02-09 15:01:33,917 [cuckoo.core.scheduler] INFO: Task #7452954: acquired machine win7x647 (label=win7x647)
2026-02-09 15:01:33,918 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.207 for task #7452954
2026-02-09 15:01:34,312 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2052088 (interface=vboxnet0, host=192.168.168.207)
2026-02-09 15:01:34,342 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x647
2026-02-09 15:01:34,922 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x647 to vmcloak
2026-02-09 15:01:49,907 [cuckoo.core.guest] INFO: Starting analysis #7452954 on guest (id=win7x647, ip=192.168.168.207)
2026-02-09 15:01:50,914 [cuckoo.core.guest] DEBUG: win7x647: not ready yet
2026-02-09 15:01:55,937 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x647, ip=192.168.168.207)
2026-02-09 15:01:56,013 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x647, ip=192.168.168.207, monitor=latest, size=6660546)
2026-02-09 15:01:57,175 [cuckoo.core.resultserver] DEBUG: Task #7452954: live log analysis.log initialized.
2026-02-09 15:01:57,964 [cuckoo.core.resultserver] DEBUG: Task #7452954 is sending a BSON stream
2026-02-09 15:01:58,323 [cuckoo.core.resultserver] DEBUG: Task #7452954 is sending a BSON stream
2026-02-09 15:01:59,218 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'shots/0001.jpg'
2026-02-09 15:01:59,241 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 133461
2026-02-09 15:02:00,042 [cuckoo.core.resultserver] DEBUG: Task #7452954 is sending a BSON stream
2026-02-09 15:02:01,310 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'shots/0002.jpg'
2026-02-09 15:02:01,313 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 24452
2026-02-09 15:02:02,410 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'shots/0003.jpg'
2026-02-09 15:02:02,414 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 46196
2026-02-09 15:02:11,695 [cuckoo.core.guest] DEBUG: win7x647: analysis #7452954 still processing
2026-02-09 15:02:26,782 [cuckoo.core.guest] DEBUG: win7x647: analysis #7452954 still processing
2026-02-09 15:02:27,651 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'curtain/1770642147.64.curtain.log'
2026-02-09 15:02:27,655 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 36
2026-02-09 15:02:27,754 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'sysmon/1770642147.75.sysmon.xml'
2026-02-09 15:02:27,759 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 184234
2026-02-09 15:02:27,765 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/9466d620dc57835a_errorpagestrings[1]'
2026-02-09 15:02:27,767 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 2949
2026-02-09 15:02:27,770 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/5fe968b76a3a036f_recoverystore.{757a05e3-05b7-11f1-b305-78589f4d5b44}.dat'
2026-02-09 15:02:27,790 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 5632
2026-02-09 15:02:27,800 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/46e019fa34465f4e_httperrorpagesscripts[1]'
2026-02-09 15:02:27,802 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 8714
2026-02-09 15:02:27,804 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/3ebd34328a4386b4_dnserror[1]'
2026-02-09 15:02:27,806 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 1857
2026-02-09 15:02:27,809 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/4e2451d35dfa92f9_{757a05e5-05b7-11f1-b305-78589f4d5b44}.dat'
2026-02-09 15:02:27,812 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 3584
2026-02-09 15:02:27,814 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'files/204d95c6fb161368_newerrorpagetemplate[1]'
2026-02-09 15:02:27,860 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 1310
2026-02-09 15:02:28,288 [cuckoo.core.resultserver] DEBUG: Task #7452954: File upload for 'shots/0004.jpg'
2026-02-09 15:02:28,309 [cuckoo.core.resultserver] DEBUG: Task #7452954 uploaded file length: 133474
2026-02-09 15:02:28,324 [cuckoo.core.resultserver] DEBUG: Task #7452954 had connection reset for <Context for LOG>
2026-02-09 15:02:29,795 [cuckoo.core.guest] INFO: win7x647: analysis completed successfully
2026-02-09 15:02:29,809 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2026-02-09 15:02:29,835 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2026-02-09 15:02:30,879 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x647 to path /srv/cuckoo/cwd/storage/analyses/7452954/memory.dmp
2026-02-09 15:02:30,880 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x647
2026-02-09 15:02:38,385 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.207 for task #7452954
2026-02-09 15:02:38,710 [cuckoo.core.scheduler] DEBUG: Released database task #7452954
2026-02-09 15:02:38,770 [cuckoo.core.scheduler] INFO: Task #7452954: analysis procedure completed

Signatures

Allocates read-write-execute memory (usually to unpack itself) (50 out of 290 events)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefec98000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefec98000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefec98000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff1cf000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff1a6000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff1a6000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff1a6000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefb5fb000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef45d4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd374000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa62c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa644000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa58b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef4444000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefb07a000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1276
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002f60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd592000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3792000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefbfab000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef383e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff3eb000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff3eb000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff3eb000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff3eb000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefda31000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd93f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1276
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd968000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x013b6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x758f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76eac000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76eac000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76eac000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ea7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ea7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ea7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75281000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75af0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75af0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75af0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75870000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76ae1000
process_handle: 0xffffffff
1 0 0
Performs some HTTP requests (1 event)
request GET http://horshinterior.online/
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 event)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 16 (PAGE_EXECUTE)
base_address: 0x04520000
process_handle: 0xffffffff
1 0 0
Uses Windows utilities for basic Windows functionality (1 event)
cmdline "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:2
Resumed a suspended thread in a remote process potentially indicative of process injection (2 events)
Process injection Process 1276 resumed a thread in remote process 2544
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000344
suspend_count: 1
process_identifier: 2544
1 0 0
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.