Static task
static1
Behavioral task
behavioral1
Sample
RouterPassView.exe
Resource
win10v2004-20220812-es
General
-
Target
RouterPassView.exe
-
Size
150KB
-
MD5
02cb43196aac6f008f9eee3e21820fd7
-
SHA1
e3c316441f01d7bcf975e2f691ff7fb2e3d71b8c
-
SHA256
a54472763025e2831d21df7c2a054e858050d26e888d4804fc29114c698dce3d
-
SHA512
df687f30c1dbd5b1478bb5109fec30b8f52e5c13f5cab0565f3a032012a15a09020bb0ce6f796ec2f282cb01e3062ee581a4584c2ea6949d83071557f54fb8a7
-
SSDEEP
3072:3pLD7vYQsQZCBCwcOn+lSAGHPJzGrpqTo1q5wWDI01vZ67i520q7:ZrpCswcOyGtGio1qTDI01y
Malware Config
Signatures
-
Nirsoft 1 IoCs
resource yara_rule sample Nirsoft
Files
-
RouterPassView.exe.exe windows x86
5e76c806baf2842487c460c964e20ceb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
_stricmp
strtoul
strchr
strncmp
sprintf
qsort
_purecall
_wcslwr
_itow
atoi
_wcsnicmp
memmove
__p__fmode
__set_app_type
_controlfp
_except_handler3
wcscmp
wcschr
free
modf
_memicmp
_wtoi
memcmp
wcstoul
wcsrchr
_wcsicmp
malloc
strcat
strlen
memcpy
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
wcscpy
memset
strcpy
fclose
wcscat
_snwprintf
wcsncat
fopen
fread
fprintf
ferror
ftell
fseek
_errno
comctl32
ord17
ImageList_AddMasked
ImageList_Create
ImageList_SetImageCount
CreateStatusWindowW
CreateToolbarEx
ImageList_ReplaceIcon
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
GetCurrentProcessId
ExitProcess
GetCurrentProcess
ReadProcessMemory
OpenProcess
SetErrorMode
DeleteFileW
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
EnumResourceNamesW
EnumResourceTypesW
GetModuleHandleA
GetStartupInfoW
GlobalUnlock
GetLastError
GetTempPathW
LoadLibraryExW
LoadLibraryW
GetProcAddress
FreeLibrary
GlobalLock
SizeofResource
FormatMessageW
GetTempFileNameW
GetVersionExW
GetFileSize
GetModuleHandleW
GetFileAttributesW
CloseHandle
GetWindowsDirectoryW
ReadFile
GetModuleFileNameW
WriteFile
CreateFileW
LocalFree
FindResourceW
LockResource
LoadResource
MultiByteToWideChar
lstrcpyW
lstrlenW
GlobalAlloc
WideCharToMultiByte
user32
GetMessageW
DrawTextExW
TranslateMessage
DispatchMessageW
IsDialogMessageW
PostQuitMessage
LoadCursorW
GetSysColorBrush
ShowWindow
ChildWindowFromPoint
SetCursor
InvalidateRect
GetWindow
SetDlgItemInt
DrawFrameControl
BeginPaint
SetWindowTextW
GetClientRect
UpdateWindow
SetDlgItemTextW
TrackPopupMenu
GetSystemMetrics
DeferWindowPos
CreateWindowExW
GetWindowRect
GetDlgItemInt
SendDlgItemMessageW
EndDialog
EndPaint
GetDlgItem
SetMenu
GetWindowPlacement
LoadAcceleratorsW
PostMessageW
DefWindowProcW
TranslateAcceleratorW
SendMessageW
SetWindowPlacement
RegisterClassW
MessageBoxW
LoadImageW
LoadIconW
SetWindowLongW
GetWindowLongW
EndDeferWindowPos
BeginDeferWindowPos
SetFocus
MoveWindow
GetMenuItemCount
GetMenuStringW
CheckMenuItem
CheckMenuRadioItem
CloseClipboard
GetCursorPos
SetClipboardData
EnableWindow
GetParent
GetSysColor
MapWindowPoints
GetMenu
GetSubMenu
GetDC
EmptyClipboard
EnableMenuItem
ReleaseDC
GetClassNameW
OpenClipboard
GetDlgCtrlID
DialogBoxParamW
DestroyMenu
CreateDialogParamW
DestroyWindow
EnumChildWindows
LoadStringW
SetWindowPos
GetWindowTextW
LoadMenuW
ModifyMenuW
GetMenuItemInfoW
RegisterWindowMessageW
GetDlgItemTextW
gdi32
SetTextColor
CreateFontIndirectW
SetBkMode
DeleteObject
GetStockObject
GetTextExtentPoint32W
SetBkColor
SelectObject
GetDeviceCaps
comdlg32
FindTextW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteW
DragAcceptFiles
DragFinish
DragQueryFileW
SHGetFileInfoW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ