Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
xpmg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xpmg.exe
Resource
win10v2004-20250314-en
General
-
Target
xpmg.exe
-
Size
10.9MB
-
MD5
73e43654e9f3df0d07d25051b2d3cfeb
-
SHA1
6eebcc3ab72ea0eeb5b9d3340145b41bea23423b
-
SHA256
666944b19c707afaa05453909d395f979a267b28ff43d90d143cd36f6b74b53e
-
SHA512
871600ae79b26bde4b5601fcf3c9e2e3d2a9f9bc04cd06d10cf69036a714a5b89b811da07070e021e7d844fc8c57a406e17361e8f738b1068b24d989e40e659c
-
SSDEEP
196608:KoykUxv987qMNR4Ok/RDpgPnqSuR3pfRkAJ:7UxFUqMNR4Ok5DpgPnqSuR3pfRf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation xpmg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2428 xpmg.exe Token: SeImpersonatePrivilege 2428 xpmg.exe Token: SeProfSingleProcessPrivilege 2428 xpmg.exe Token: SeTakeOwnershipPrivilege 2428 xpmg.exe Token: SeBackupPrivilege 2428 xpmg.exe Token: SeRestorePrivilege 2428 xpmg.exe Token: SeIncBasePriorityPrivilege 2428 xpmg.exe Token: 33 2428 xpmg.exe Token: SeSecurityPrivilege 2428 xpmg.exe Token: SeIncreaseQuotaPrivilege 2428 xpmg.exe Token: SeShutdownPrivilege 2428 xpmg.exe Token: SeAssignPrimaryTokenPrivilege 2428 xpmg.exe Token: SeIncBasePriorityPrivilege 2428 xpmg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.