Overview
overview
10Static
static
1Compil32.exe
windows7-x64
10Compil32.exe
windows10-2004-x64
10ISCmplr.dll
windows7-x64
3ISCmplr.dll
windows10-2004-x64
3bindcompdbx290.dll
windows7-x64
1bindcompdbx290.dll
windows10-2004-x64
1bindcompfmx290.dll
windows7-x64
1bindcompfmx290.dll
windows10-2004-x64
1bindcompvcl290.dll
windows7-x64
1bindcompvcl290.dll
windows10-2004-x64
1dsnap290.dll
windows7-x64
1dsnap290.dll
windows10-2004-x64
1dsnapcon290.dll
windows7-x64
1dsnapcon290.dll
windows10-2004-x64
1dsnapxml290.dll
windows7-x64
1dsnapxml290.dll
windows10-2004-x64
1dunitrtl290.dll
windows7-x64
1dunitrtl290.dll
windows10-2004-x64
1emsclient290.dll
windows7-x64
1emsclient290.dll
windows10-2004-x64
1emsclientf...90.dll
windows7-x64
1emsclientf...90.dll
windows10-2004-x64
1emsedge290.dll
windows7-x64
1emsedge290.dll
windows10-2004-x64
1emshosting290.dll
windows7-x64
1emshosting290.dll
windows10-2004-x64
1rectum.pptx
windows7-x64
3rectum.pptx
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 07:58
Static task
static1
Behavioral task
behavioral1
Sample
Compil32.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Compil32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
ISCmplr.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ISCmplr.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
bindcompdbx290.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
bindcompdbx290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
bindcompfmx290.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
bindcompfmx290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
bindcompvcl290.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
bindcompvcl290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
dsnap290.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
dsnap290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
dsnapcon290.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
dsnapcon290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
dsnapxml290.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
dsnapxml290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
dunitrtl290.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
dunitrtl290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
emsclient290.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
emsclient290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
emsclientfiredac290.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
emsclientfiredac290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
emsedge290.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
emsedge290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
emshosting290.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
emshosting290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
rectum.pptx
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
rectum.pptx
Resource
win10v2004-20250217-en
General
-
Target
Compil32.exe
-
Size
4.0MB
-
MD5
20d23b37c54fc1434ff3105a165cdac7
-
SHA1
9cb3811fb5f2ecacadc831d82e7e850abedc19ae
-
SHA256
8fa9074cd74cbcedc44b12999dbc5f4e51ea82caa24be18b073686229f1f9db8
-
SHA512
40eb9cc31a97996237e69d975efc1a3c22297403bef211427752926a331e9913801bacc7236e4a67ce988c110ccbda3dbd3e65bcc185d512cfc951b0e05fb409
-
SSDEEP
98304:ByzK9w6TfpPaVG5I+Juv5380exR4KuNFL3N:QWViB3Mwx
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/4532-38-0x0000000000500000-0x00000000005C4000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4972 set thread context of 5072 4972 Compil32.exe 84 PID 5072 set thread context of 4532 5072 more.com 86 -
Executes dropped EXE 1 IoCs
pid Process 4972 Compil32.exe -
Loads dropped DLL 1 IoCs
pid Process 4972 Compil32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Compil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Compil32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 668 Compil32.exe 4972 Compil32.exe 4972 Compil32.exe 5072 more.com 4532 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4972 Compil32.exe 5072 more.com 5072 more.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4532 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 668 wrote to memory of 4972 668 Compil32.exe 83 PID 668 wrote to memory of 4972 668 Compil32.exe 83 PID 668 wrote to memory of 4972 668 Compil32.exe 83 PID 4972 wrote to memory of 5072 4972 Compil32.exe 84 PID 4972 wrote to memory of 5072 4972 Compil32.exe 84 PID 4972 wrote to memory of 5072 4972 Compil32.exe 84 PID 4972 wrote to memory of 5072 4972 Compil32.exe 84 PID 5072 wrote to memory of 4532 5072 more.com 86 PID 5072 wrote to memory of 4532 5072 more.com 86 PID 5072 wrote to memory of 4532 5072 more.com 86 PID 5072 wrote to memory of 4532 5072 more.com 86 PID 5072 wrote to memory of 4532 5072 more.com 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Compil32.exe"C:\Users\Admin\AppData\Local\Temp\Compil32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:668 -
C:\ProgramData\REACTORHELP\Compil32.exeC:\ProgramData\REACTORHELP\Compil32.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD520d23b37c54fc1434ff3105a165cdac7
SHA19cb3811fb5f2ecacadc831d82e7e850abedc19ae
SHA2568fa9074cd74cbcedc44b12999dbc5f4e51ea82caa24be18b073686229f1f9db8
SHA51240eb9cc31a97996237e69d975efc1a3c22297403bef211427752926a331e9913801bacc7236e4a67ce988c110ccbda3dbd3e65bcc185d512cfc951b0e05fb409
-
Filesize
1.2MB
MD574f9019e7837376e1ed937009825a3bd
SHA169792a028064d8b0fc24ded4d4ec85ca4bd355a3
SHA2563f6a4f7b4601d22a8883098ee7068aa806429f2c99224e3ad000dd600c71656f
SHA5127e78507c5a983dc156106426f4969a41a3656e7d26a652e96237892a343ebe452bce9d7ace85d3fea523cc4b6f152cf9ab44f43b374c5d4e0ca2c5f2862b53aa
-
Filesize
56KB
MD597be2802620294b180fa4e025f5580e1
SHA1d405925fef2329436e982025cb85b2b97d2d57f7
SHA2569b73dd457bf7ef276c3aaabda5f184b5d7bcf4e350744977aa16d17fcb1523d1
SHA5121125d6451431507dfe64cf54c8445a3aeb18786c2a16a6a8e88405fe6be8f94cbfe4b8188a6e7c01868d64335b6288a7648ffaa100fba5fb6080096d95aa53d5
-
Filesize
1.4MB
MD5ab3f95ce7eddebf96dc9a4b7fc9b253c
SHA11b370e78434ff6766ec4e48e47586dba624553ba
SHA256ca2332f4a8db6e2efaee29d3fcd0d85d6aa5ab528af82b1babafce3dd82b1a1d
SHA5121d4bb5a6ec3e1fc83bbcf1d3fb85bd4049f22938d6a2cab61508f8d139f7448ddf8f4c4be6729ed69cb8a2cbf63dec0a705a5fc9a4a5c2c75c2e513572f97d46
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2