Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows7-x64
5Ransomware...KB.exe
windows7-x64
5Ransomware...KB.exe
windows10-2004-x64
5Ransomware...KB.exe
windows10-ltsc_2021-x64
5Ransomware...KB.exe
windows11-21h2-x64
5779389082
windows10-2004-x64
779389082
windows7-x64
779389082
windows10-2004-x64
779389082
windows10-ltsc_2021-x64
779389082
windows11-21h2-x64
Ransomware...KB.ps1
windows10-ltsc_2021-x64
Ransomware...KB.ps1
windows7-x64
Ransomware...KB.ps1
windows10-2004-x64
Ransomware...KB.ps1
windows10-ltsc_2021-x64
Ransomware...KB.ps1
windows11-21h2-x64
Ransomware...KB.ps1
windows11-21h2-x64
Ransomware...KB.ps1
windows7-x64
Ransomware...KB.ps1
windows10-2004-x64
Ransomware...KB.ps1
windows10-ltsc_2021-x64
Ransomware...KB.ps1
windows11-21h2-x64
Resubmissions
25/03/2025, 15:11
250325-skmbpsxzaw 1025/03/2025, 15:06
250325-sg1d6a1px2 1025/03/2025, 15:01
250325-sd5jpsxyct 1025/03/2025, 14:56
250325-sbdcfaxxgs 1025/03/2025, 14:50
250325-r7ve6a1nv3 1025/03/2025, 14:46
250325-r5ab7sxwhx 1025/03/2025, 14:40
250325-r2c9paxwe1 1005/02/2025, 10:25
250205-mgcefaslhw 1005/02/2025, 10:17
250205-mbs51atmbk 1005/02/2025, 09:15
250205-k785zs1pfn 10Analysis
-
max time kernel
99s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win7-20241023-en
Behavioral task
behavioral3
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win7-20250207-en
Behavioral task
behavioral7
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win7-20241023-en
Behavioral task
behavioral13
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
779389082
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
779389082
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
779389082
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
779389082
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
779389082
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral22
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win11-20250313-en
General
-
Target
RansomwareSamples/Hades_29_03_2021_1909KB.exe
-
Size
1.9MB
-
MD5
9fa1ba3e7d6e32f240c790753cdaaf8e
-
SHA1
7bcea3fbfcb4c170c57c9050499e1fae40f5d731
-
SHA256
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
-
SHA512
8d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe
-
SSDEEP
49152:zHOalx8WJjq64Hv7OHxTAhEu5undVmB9dn5AI7EyP3S:Z/8WJjiPSRRu5undVmDd5VEyvS
Malware Config
Extracted
C:\Users\Admin\HOW-TO-DECRYPT-gn9cj.txt
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades family
-
Hades payload 4 IoCs
resource yara_rule behavioral1/memory/1808-1-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades behavioral1/memory/1320-9-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades behavioral1/memory/1320-328-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades behavioral1/memory/1808-330-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades -
resource yara_rule behavioral1/files/0x001a00000002b415-6.dat cryptone -
Renames multiple (154) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 1320 Self -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1320 1808 Hades_29_03_2021_1909KB.exe 78 PID 1808 wrote to memory of 1320 1808 Hades_29_03_2021_1909KB.exe 78 PID 1320 wrote to memory of 644 1320 Self 79 PID 1320 wrote to memory of 644 1320 Self 79 PID 1808 wrote to memory of 5276 1808 Hades_29_03_2021_1909KB.exe 81 PID 1808 wrote to memory of 5276 1808 Hades_29_03_2021_1909KB.exe 81 PID 644 wrote to memory of 2612 644 cmd.exe 83 PID 644 wrote to memory of 2612 644 cmd.exe 83 PID 5276 wrote to memory of 4600 5276 cmd.exe 84 PID 5276 wrote to memory of 4600 5276 cmd.exe 84 PID 5276 wrote to memory of 848 5276 cmd.exe 86 PID 5276 wrote to memory of 848 5276 cmd.exe 86 PID 644 wrote to memory of 5896 644 cmd.exe 85 PID 644 wrote to memory of 5896 644 cmd.exe 85 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 848 attrib.exe 5896 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hades_29_03_2021_1909KB.exeC:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hades_29_03_2021_1909KB.exe bcdedit /set shutdown /r /f /t 21⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\DddsProcessor\SelfC:\Users\Admin\AppData\Roaming\DddsProcessor\Self bcdedit /set shutdown /r /f /t 2 /go2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\DddsProcessor\Self" & del "C:\Users\Admin\AppData\Roaming\DddsProcessor\Self" & rd "C:\Users\Admin\AppData\Roaming\DddsProcessor\"3⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y4⤵PID:2612
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\DddsProcessor\Self"4⤵
- Views/modifies file attributes
PID:5896
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hades_29_03_2021_1909KB.exe" & del "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hades_29_03_2021_1909KB.exe" & rd "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\"2⤵
- Suspicious use of WriteProcessMemory
PID:5276 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y3⤵PID:4600
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hades_29_03_2021_1909KB.exe"3⤵
- Views/modifies file attributes
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59fa1ba3e7d6e32f240c790753cdaaf8e
SHA17bcea3fbfcb4c170c57c9050499e1fae40f5d731
SHA256fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
SHA5128d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe
-
Filesize
3KB
MD50c6d0a67b942d06fe27f41c7c582cdfe
SHA17e674cf6375b138cabca2706583d4ced7a1aef27
SHA256014ea5effc97085b7832512b9ad2a5c4487265eb67e8d7b0920ef2bc8768400c
SHA51253ec4509bc58f53419a8923d808c7dfdecf57dc203c37265d061aebab73147720d1c419e79578065a42c3b2a63504370f90516c3f0afad5d6997952592d3a39c