Overview
overview
10Static
static
1Compil32.exe
windows7-x64
10Compil32.exe
windows10-2004-x64
10ISCmplr.dll
windows7-x64
3ISCmplr.dll
windows10-2004-x64
3bindcompdbx290.dll
windows7-x64
1bindcompdbx290.dll
windows10-2004-x64
1bindcompfmx290.dll
windows7-x64
1bindcompfmx290.dll
windows10-2004-x64
1bindcompvcl290.dll
windows7-x64
1bindcompvcl290.dll
windows10-2004-x64
1dsnap290.dll
windows7-x64
1dsnap290.dll
windows10-2004-x64
1dsnapcon290.dll
windows7-x64
1dsnapcon290.dll
windows10-2004-x64
1dsnapxml290.dll
windows7-x64
1dsnapxml290.dll
windows10-2004-x64
1dunitrtl290.dll
windows7-x64
1dunitrtl290.dll
windows10-2004-x64
1emsclient290.dll
windows7-x64
1emsclient290.dll
windows10-2004-x64
1emsclientf...90.dll
windows7-x64
1emsclientf...90.dll
windows10-2004-x64
1emsedge290.dll
windows7-x64
1emsedge290.dll
windows10-2004-x64
1emshosting290.dll
windows7-x64
1emshosting290.dll
windows10-2004-x64
1rectum.pptx
windows7-x64
3rectum.pptx
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 07:49
Static task
static1
Behavioral task
behavioral1
Sample
Compil32.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Compil32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
ISCmplr.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ISCmplr.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
bindcompdbx290.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
bindcompdbx290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
bindcompfmx290.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
bindcompfmx290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
bindcompvcl290.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
bindcompvcl290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
dsnap290.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
dsnap290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
dsnapcon290.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
dsnapcon290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
dsnapxml290.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
dsnapxml290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
dunitrtl290.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
dunitrtl290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
emsclient290.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
emsclient290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
emsclientfiredac290.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
emsclientfiredac290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
emsedge290.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
emsedge290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
emshosting290.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
emshosting290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
rectum.pptx
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
rectum.pptx
Resource
win10v2004-20250217-en
General
-
Target
Compil32.exe
-
Size
4.0MB
-
MD5
20d23b37c54fc1434ff3105a165cdac7
-
SHA1
9cb3811fb5f2ecacadc831d82e7e850abedc19ae
-
SHA256
8fa9074cd74cbcedc44b12999dbc5f4e51ea82caa24be18b073686229f1f9db8
-
SHA512
40eb9cc31a97996237e69d975efc1a3c22297403bef211427752926a331e9913801bacc7236e4a67ce988c110ccbda3dbd3e65bcc185d512cfc951b0e05fb409
-
SSDEEP
98304:ByzK9w6TfpPaVG5I+Juv5380exR4KuNFL3N:QWViB3Mwx
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3012-41-0x0000000000400000-0x00000000004C4000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2848 set thread context of 1876 2848 Compil32.exe 30 PID 1876 set thread context of 3012 1876 more.com 32 -
Executes dropped EXE 1 IoCs
pid Process 2848 Compil32.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 Compil32.exe 2848 Compil32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Compil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Compil32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2828 Compil32.exe 2848 Compil32.exe 2848 Compil32.exe 1876 more.com -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2848 Compil32.exe 1876 more.com 1876 more.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 MSBuild.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2828 wrote to memory of 2848 2828 Compil32.exe 29 PID 2848 wrote to memory of 1876 2848 Compil32.exe 30 PID 2848 wrote to memory of 1876 2848 Compil32.exe 30 PID 2848 wrote to memory of 1876 2848 Compil32.exe 30 PID 2848 wrote to memory of 1876 2848 Compil32.exe 30 PID 2848 wrote to memory of 1876 2848 Compil32.exe 30 PID 1876 wrote to memory of 3012 1876 more.com 32 PID 1876 wrote to memory of 3012 1876 more.com 32 PID 1876 wrote to memory of 3012 1876 more.com 32 PID 1876 wrote to memory of 3012 1876 more.com 32 PID 1876 wrote to memory of 3012 1876 more.com 32 PID 1876 wrote to memory of 3012 1876 more.com 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Compil32.exe"C:\Users\Admin\AppData\Local\Temp\Compil32.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\ProgramData\REACTORHELP\Compil32.exeC:\ProgramData\REACTORHELP\Compil32.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD574f9019e7837376e1ed937009825a3bd
SHA169792a028064d8b0fc24ded4d4ec85ca4bd355a3
SHA2563f6a4f7b4601d22a8883098ee7068aa806429f2c99224e3ad000dd600c71656f
SHA5127e78507c5a983dc156106426f4969a41a3656e7d26a652e96237892a343ebe452bce9d7ace85d3fea523cc4b6f152cf9ab44f43b374c5d4e0ca2c5f2862b53aa
-
Filesize
56KB
MD597be2802620294b180fa4e025f5580e1
SHA1d405925fef2329436e982025cb85b2b97d2d57f7
SHA2569b73dd457bf7ef276c3aaabda5f184b5d7bcf4e350744977aa16d17fcb1523d1
SHA5121125d6451431507dfe64cf54c8445a3aeb18786c2a16a6a8e88405fe6be8f94cbfe4b8188a6e7c01868d64335b6288a7648ffaa100fba5fb6080096d95aa53d5
-
Filesize
1.4MB
MD5d9417fc126fc3870efe4dd5bf279db1c
SHA129215c931403dc78d9545f5c085bd5e355ad7e93
SHA256c3ecf1a576066987131789c1398618c5ff41054b03895ef8a791c5355970b146
SHA512055459b81b0cec7999f1b76070f92e5a91edea684a0718ac9c26706066adb6eb541a0881e656d5a16740ae68814e809bc65502120d5fec9d2611114dc24ff65c
-
Filesize
4.0MB
MD520d23b37c54fc1434ff3105a165cdac7
SHA19cb3811fb5f2ecacadc831d82e7e850abedc19ae
SHA2568fa9074cd74cbcedc44b12999dbc5f4e51ea82caa24be18b073686229f1f9db8
SHA51240eb9cc31a97996237e69d975efc1a3c22297403bef211427752926a331e9913801bacc7236e4a67ce988c110ccbda3dbd3e65bcc185d512cfc951b0e05fb409