Analysis
-
max time kernel
283s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
31/08/2023, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
TCPOptimizer.exe
Resource
win7-20230712-es
Behavioral task
behavioral2
Sample
TCPOptimizer.exe
Resource
win10v2004-20230703-es
General
-
Target
TCPOptimizer.exe
-
Size
668KB
-
MD5
d8292150c8ce862a97a923318df07805
-
SHA1
917f917ff9fe33e199388e5e1d4c0696882d2991
-
SHA256
0a49dc0d2ce725af347df632539b70afcfd22b38e285920b515143332a5511e9
-
SHA512
3f23dd72d066d3f09a49c5dcf062471cfd412cf65934c25887774c1060d2efa8cb277df5ffb89272c5cb1aab6498e3e82b9d6ec9725b5b7263de60cc9198d475
-
SSDEEP
6144:h0eD/NMpAte8M0Ic61arFbMAIhTRlDDHbndz+vTEEIeh+b6YzICrz/KiiUy5q7:C1B8g1arhMAURdndzQTEEI7b6Yz3m5W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER\explorer.exe = "10" TCPOptimizer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER\iexplore.exe = "10" TCPOptimizer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER\explorer.exe = "10" TCPOptimizer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER\iexplore.exe = "10" TCPOptimizer.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3628 PowerShell.exe 3628 PowerShell.exe 4140 PowerShell.exe 4140 PowerShell.exe 5044 PowerShell.exe 5044 PowerShell.exe 3652 PowerShell.exe 3652 PowerShell.exe 3844 powershell.exe 3844 powershell.exe 4164 PowerShell.exe 4164 PowerShell.exe 4116 PowerShell.exe 4116 PowerShell.exe 4776 PowerShell.exe 4776 PowerShell.exe 3536 PowerShell.exe 3536 PowerShell.exe 2644 PowerShell.exe 2644 PowerShell.exe 3180 PowerShell.exe 3180 PowerShell.exe 3088 PowerShell.exe 3088 PowerShell.exe 5068 PowerShell.exe 5068 PowerShell.exe 3120 PowerShell.exe 3120 PowerShell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 TCPOptimizer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3628 PowerShell.exe Token: SeIncreaseQuotaPrivilege 3628 PowerShell.exe Token: SeSecurityPrivilege 3628 PowerShell.exe Token: SeTakeOwnershipPrivilege 3628 PowerShell.exe Token: SeLoadDriverPrivilege 3628 PowerShell.exe Token: SeSystemProfilePrivilege 3628 PowerShell.exe Token: SeSystemtimePrivilege 3628 PowerShell.exe Token: SeProfSingleProcessPrivilege 3628 PowerShell.exe Token: SeIncBasePriorityPrivilege 3628 PowerShell.exe Token: SeCreatePagefilePrivilege 3628 PowerShell.exe Token: SeBackupPrivilege 3628 PowerShell.exe Token: SeRestorePrivilege 3628 PowerShell.exe Token: SeShutdownPrivilege 3628 PowerShell.exe Token: SeDebugPrivilege 3628 PowerShell.exe Token: SeSystemEnvironmentPrivilege 3628 PowerShell.exe Token: SeRemoteShutdownPrivilege 3628 PowerShell.exe Token: SeUndockPrivilege 3628 PowerShell.exe Token: SeManageVolumePrivilege 3628 PowerShell.exe Token: 33 3628 PowerShell.exe Token: 34 3628 PowerShell.exe Token: 35 3628 PowerShell.exe Token: 36 3628 PowerShell.exe Token: SeDebugPrivilege 4140 PowerShell.exe Token: SeIncreaseQuotaPrivilege 4140 PowerShell.exe Token: SeSecurityPrivilege 4140 PowerShell.exe Token: SeTakeOwnershipPrivilege 4140 PowerShell.exe Token: SeLoadDriverPrivilege 4140 PowerShell.exe Token: SeSystemProfilePrivilege 4140 PowerShell.exe Token: SeSystemtimePrivilege 4140 PowerShell.exe Token: SeProfSingleProcessPrivilege 4140 PowerShell.exe Token: SeIncBasePriorityPrivilege 4140 PowerShell.exe Token: SeCreatePagefilePrivilege 4140 PowerShell.exe Token: SeBackupPrivilege 4140 PowerShell.exe Token: SeRestorePrivilege 4140 PowerShell.exe Token: SeShutdownPrivilege 4140 PowerShell.exe Token: SeDebugPrivilege 4140 PowerShell.exe Token: SeSystemEnvironmentPrivilege 4140 PowerShell.exe Token: SeRemoteShutdownPrivilege 4140 PowerShell.exe Token: SeUndockPrivilege 4140 PowerShell.exe Token: SeManageVolumePrivilege 4140 PowerShell.exe Token: 33 4140 PowerShell.exe Token: 34 4140 PowerShell.exe Token: 35 4140 PowerShell.exe Token: 36 4140 PowerShell.exe Token: SeDebugPrivilege 5044 PowerShell.exe Token: SeIncreaseQuotaPrivilege 5044 PowerShell.exe Token: SeSecurityPrivilege 5044 PowerShell.exe Token: SeTakeOwnershipPrivilege 5044 PowerShell.exe Token: SeLoadDriverPrivilege 5044 PowerShell.exe Token: SeSystemProfilePrivilege 5044 PowerShell.exe Token: SeSystemtimePrivilege 5044 PowerShell.exe Token: SeProfSingleProcessPrivilege 5044 PowerShell.exe Token: SeIncBasePriorityPrivilege 5044 PowerShell.exe Token: SeCreatePagefilePrivilege 5044 PowerShell.exe Token: SeBackupPrivilege 5044 PowerShell.exe Token: SeRestorePrivilege 5044 PowerShell.exe Token: SeShutdownPrivilege 5044 PowerShell.exe Token: SeDebugPrivilege 5044 PowerShell.exe Token: SeSystemEnvironmentPrivilege 5044 PowerShell.exe Token: SeRemoteShutdownPrivilege 5044 PowerShell.exe Token: SeUndockPrivilege 5044 PowerShell.exe Token: SeManageVolumePrivilege 5044 PowerShell.exe Token: 33 5044 PowerShell.exe Token: 34 5044 PowerShell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1488 TCPOptimizer.exe 1488 TCPOptimizer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1488 wrote to memory of 864 1488 TCPOptimizer.exe 82 PID 1488 wrote to memory of 864 1488 TCPOptimizer.exe 82 PID 1488 wrote to memory of 864 1488 TCPOptimizer.exe 82 PID 1488 wrote to memory of 664 1488 TCPOptimizer.exe 84 PID 1488 wrote to memory of 664 1488 TCPOptimizer.exe 84 PID 1488 wrote to memory of 3628 1488 TCPOptimizer.exe 87 PID 1488 wrote to memory of 3628 1488 TCPOptimizer.exe 87 PID 1488 wrote to memory of 4140 1488 TCPOptimizer.exe 96 PID 1488 wrote to memory of 4140 1488 TCPOptimizer.exe 96 PID 1488 wrote to memory of 5044 1488 TCPOptimizer.exe 98 PID 1488 wrote to memory of 5044 1488 TCPOptimizer.exe 98 PID 1488 wrote to memory of 1492 1488 TCPOptimizer.exe 102 PID 1488 wrote to memory of 1492 1488 TCPOptimizer.exe 102 PID 1488 wrote to memory of 3652 1488 TCPOptimizer.exe 104 PID 1488 wrote to memory of 3652 1488 TCPOptimizer.exe 104 PID 1488 wrote to memory of 3844 1488 TCPOptimizer.exe 109 PID 1488 wrote to memory of 3844 1488 TCPOptimizer.exe 109 PID 1488 wrote to memory of 4164 1488 TCPOptimizer.exe 112 PID 1488 wrote to memory of 4164 1488 TCPOptimizer.exe 112 PID 1488 wrote to memory of 4116 1488 TCPOptimizer.exe 116 PID 1488 wrote to memory of 4116 1488 TCPOptimizer.exe 116 PID 1488 wrote to memory of 4776 1488 TCPOptimizer.exe 118 PID 1488 wrote to memory of 4776 1488 TCPOptimizer.exe 118 PID 1488 wrote to memory of 3536 1488 TCPOptimizer.exe 120 PID 1488 wrote to memory of 3536 1488 TCPOptimizer.exe 120 PID 1488 wrote to memory of 2644 1488 TCPOptimizer.exe 122 PID 1488 wrote to memory of 2644 1488 TCPOptimizer.exe 122 PID 1488 wrote to memory of 2204 1488 TCPOptimizer.exe 124 PID 1488 wrote to memory of 2204 1488 TCPOptimizer.exe 124 PID 1488 wrote to memory of 3180 1488 TCPOptimizer.exe 126 PID 1488 wrote to memory of 3180 1488 TCPOptimizer.exe 126 PID 1488 wrote to memory of 3088 1488 TCPOptimizer.exe 128 PID 1488 wrote to memory of 3088 1488 TCPOptimizer.exe 128 PID 1488 wrote to memory of 5068 1488 TCPOptimizer.exe 130 PID 1488 wrote to memory of 5068 1488 TCPOptimizer.exe 130 PID 1488 wrote to memory of 3044 1488 TCPOptimizer.exe 132 PID 1488 wrote to memory of 3044 1488 TCPOptimizer.exe 132 PID 1488 wrote to memory of 3120 1488 TCPOptimizer.exe 134 PID 1488 wrote to memory of 3120 1488 TCPOptimizer.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\TCPOptimizer.exe"C:\Users\Admin\AppData\Local\Temp\TCPOptimizer.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\netsh.exenetsh int tcp show supplemental2⤵PID:864
-
-
C:\Windows\SYSTEM32\netsh.exenetsh int ip show interfaces2⤵PID:664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetAdapterLso -Name '*'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetAdapterChecksumOffload '*'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetTCPSetting -SettingName internet2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SYSTEM32\netsh.exenetsh int tcp show global2⤵PID:1492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetOffloadGlobalSetting2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-NetOffloadGlobalSetting -ReceiveSegmentCoalescing disabled2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Disable-NetAdapterLso -Name *2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Enable-NetAdapterChecksumOffload -Name *2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Set-NetTCPSetting -SettingName internet -EcnCapability default2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Set-NetTCPSetting -SettingName internet -MaxSynRetransmissions 22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Set-NetTCPSetting -SettingName internet -InitialRto 20002⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\SYSTEM32\netsh.exenetsh int ip show interfaces2⤵PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetAdapterLso -Name '*'2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetAdapterChecksumOffload '*'2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetTCPSetting -SettingName internet2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Windows\SYSTEM32\netsh.exenetsh int tcp show global2⤵PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe Get-NetOffloadGlobalSetting2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5fa657552781362e0c7febc015952f2f1
SHA18a4a011bbd48b164f801394b128eb76d536692cb
SHA256437caa0214c9e08fc2ed4e73132b7220f2ebcf92dfc8747b9eda08fd6a09b8bc
SHA5129a09aff6c35bcab5df800c5937d6874d5c6516b7e988567ac5b10bd192ffde1f9a15420b52c5a97d36b8f900e6ecf0f1076011138e5d389976167732f767f73a
-
Filesize
1KB
MD5221780d8c15b54b96307b218ede5c445
SHA16dcb2aa8b6a33d8b9e4d667bea4a66e8a52f70bd
SHA256692e07daac73e47cdb8412cc2e5400f339d10e02a13ef4b5bfe460f44e3732f1
SHA5128b4c0bf4bddd195fb1f6649073a513627d398ad3789fd47875a28eca4ae825eb1a6d6d37c844d25864f1c6b71a88be2a37145441a3d540cd8102cb19d8c6e514
-
Filesize
1KB
MD50308c92cf90946b1002c1121607f5b86
SHA1edaafbd445a52723b5a8441ffd7ed7cf304246bc
SHA256c8a754cbf81defa7e8a4f26af951a080834574ea8cd809be8492c0b58b5860cc
SHA512832e4b5220d8231696bc04e41a8c54d0dcddcfd0cb3160bbbddccf792dc051dd741b66863cfa15d13e4ff37ae2e3aec778b6add9cd62bc51471aeb16aeaceeaf
-
Filesize
1KB
MD56a4a3f91771808e387efc96de73c201a
SHA1bd29803080e4bc0534382263af4302922303a3b3
SHA256f84b680865d2f579cf5cc31e773de1c3480d1e2f88fc27a04993d62637ea74d7
SHA512f6e570c42074b5fad90cd548ead07b7fc6503b6a36f6e5cc4680559b63af44fed1999a0753833071abfaf117b0989321eb4470f880e5d3351f3042153f5f0432
-
Filesize
1KB
MD5c745771bc758060a28a180556bbea9f0
SHA10d1de18eaf46072947beb04614c97abd05524d40
SHA2563281ef45536b28513a2adf2af913e9bd1934a945490901bc4657fd5a774623a1
SHA512d7b3a92b0c06030df434f0f61b1d47287bc517d56e4a04b3290f9cb71b9e5154a748d605caa7733f4a103563fc967d72164e5a7098bdf415cc63ef41e70ad2ce
-
Filesize
1KB
MD5be6adb103f05b44cdff89c810df3d571
SHA1ccbdce8d16d198c4f4dba434f0a564ab490934d3
SHA2562da95d969200b1560ca9a1f591da7138ddae82eac4f662d15b441234f1362b91
SHA512bb5b3e8126e1b3d9f3923c5c7a64afbc1443a5ddc30c252a8622da60ebbf8e8cf21ef6f58a83ee15dccf5a98fdfaddcf48e60a01aaf99d005cf24d68d37cc6b8
-
Filesize
1KB
MD51a8c7052d0ceb101afa3a8164ecfb3c6
SHA11e5a09e16e6d45401910dd4afb09edfed0233469
SHA256eea7d90996add012a77d3f99b6fc59faed70e59f9bd3bb70c3342000bd802085
SHA512c749a048e3dfbc52bb57c65a3eeb25831d3e6c5f7c2027afb71008cf8acdaaf3af2720d34469f0ea7d977408eee0139b0734ac5ea399a35bca3896c2a0e87dcc
-
Filesize
1KB
MD56b892d7c8698c40011e5c98354a5e79d
SHA1fcce41ee7b5ca7672335132471f593d1fa96be66
SHA256e57eb1844753148d4792b715ad00d23540ec39bec75cdb6aa58043abdda15c9d
SHA512a5c8b7c0ae50ae7636413b5bd21b39da1de797970b9254e82c38fbced1ab1798eec9aabda8e3679bdf8f6ac41b4daef68dcbc1111c5c7a7d9ea03006c2e8a7fd
-
Filesize
1KB
MD58e79540d70125066d4a4e3c202968d51
SHA17b76add9e8b9e7a29f11e19c94414f155becce2c
SHA256d3b3f33f32de81aa4aaa148e324fa95fd84e651fa529133af889489dfc9d7c2b
SHA51216f459eedd0905a8ff18fdf8dc405cc81d88f33f735da4b799d13292b37d2efdec6dd1601943af33479a953e122d18af481d9357f29e5075e5c3a7c00cb8ef08
-
Filesize
1KB
MD5dc05f70803a87866da249762062f75eb
SHA1d15c4f362903d41b9965fdfcff0a52669b21c504
SHA2562980d5b8034a9b1aeb363cb6d9c96ff50ed82b4ba1575af77587fca11dab61b7
SHA5122bcd3ecc11d6ba826b09d451af9137ad689065e36ac3690179709d84d137c9f8709077c95495c82b1519fb382de8614934b6784225b02e259353c15795a4ff0c
-
Filesize
1KB
MD5af146717a40006d7ae6360665a71d0e3
SHA14fd231c5094f474f66294ed24a518269d8755165
SHA256ddabfea9c5322784cb0cc60cae6e1c5dab0dad48861bfdac6c8e89cf84d366bb
SHA5125a1b7d860a75fa65b70a06f1fe26ab399d41a620d98b3012a1a50c7cbc68540be94135402a642854031c739f937bb3441ca7c45c8562f199167f1252c17b6a01
-
Filesize
1KB
MD5686f349cbc6c61b53d451e19a3575e6c
SHA10bf1146b0188376071464a1adb3b368811fdf8cc
SHA2567c1bb61d14f056a040c266dc276afc737075ad570361b82345926e6d1f8c22f3
SHA512b379fb40b0ac556216be1acf8615b795b4dbe3222f6f9b598e9a032884d7abdc6a8bf19b341689bdc89c9ed0f604592004705832a2df3ddc9960162c0342795c
-
Filesize
1KB
MD56a206d34453b2a107a4c38de19659dd1
SHA1ee6a1d490a03b222ea381f68373b4ba0edc06a51
SHA256c462eae354478004768225f55a2015a8537512c16eba2e296c28965c0e02bc28
SHA512a9c6c504e3ee64460e269d90ea406ee4e09870624dfbcf7f91cf0f38480c3def77e8c6c95ca650a8347c846327ecaca107cafda40fdd54f85fe82b7899d4cefe
-
Filesize
1KB
MD50e0a5d5b2c9c5f00d9a027b2a6de5d2e
SHA12b23bfb7f498713655524148890bbf083293909b
SHA256f106fadb611ef923cbf5301c14b5a1761f5cd2685ce8f54dd4ab735b3ab92074
SHA512a28581673a1ef285a99537f3e478af91ea7259484a063e6098bc9212fddd5c27fec12658b71786b227e39b3052e82b635793970076f1203b2af32be8dff45490
-
Filesize
1KB
MD57776dcefff9396d9ae4c5fd4c735bc14
SHA1a2f97253c5414c401f1d00d46fbc7d967fc9203e
SHA256f6af6ccbd81123904e8cef77bf1e332b5ee2136808141fc34cb2e0992cf7babb
SHA51245c7f14b2f01574b693ef097f421c16fbca633ba2f28afae5df5b943ef543c066d05060edd70ae9aaaaddbcad8c6c45af0d0739fc04959d3bcf291ce444fa234
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82