Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

CAPA: The Basics

Premium room

Learn to use CAPA to identify malicious capabilities.

easy

60 min

48,795

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

One of the challenges when analyzing potentially malicious software is that we risk our machine or environment being compromised when we run it unless we have a or a completely isolated environment where we can test all we want. Generally speaking, there are two types of analysis: and . This room will focus on conducting using a tool called CAPA.

CAPA (Common Analysis Platform for Artifacts) is a tool developed by the FireEye Mandiant team. It is designed to identify the capabilities present in executable files like Portable Executables (), ELF binaries, .NET modules, shellcode, and even reports. It does so by analyzing the file and applying a set of rules that describe common behaviours, allowing it to determine what the program is capable of doing, such as network communication, file manipulation, process injection, and many more.

The beauty of CAPA is that it encapsulates years of reverse engineering knowledge into an automated tool, making it accessible even to those who may not be experts in reverse engineering. This can be incredibly useful for analysts and security professionals, allowing them to quickly understand potentially malicious software's functionality without manually reverse engineering the code.

This tool is particularly useful in malware analysis and threat hunting, where understanding a binary's capabilities is crucial for incident response and defensive measures.


Learning Objectives

  • Explore what CAPA is
  • Learn how to use CAPA effectively
  • Understand common fields and results rendered by using the tool
  • Leverage the tool to Identify the program’s potential activity


Room Prerequisites

Familiarity with the ATT&ACK Framework is recommended but not mandatory before starting the course. You may check the room associated with it.

Virtual Machine

Press the Start Machine button below.

We will use the tool inside the machine attached to this task. The machine will start in a split-screen view. If you opt to access the machine via Remote Desktop (), you may also use the following credentials below.

TryHackMe credentials.
Username Administrator
Password letmein123!
IP Address MACHINE_IP

Note that inside this , we have installed CAPA so you can get a feel for running the tool and experiment further with the different command parameters. However, it takes a long time to finish using the attached . Hence, we have pre-processed the reports such as the following:

  • cryptbot.txt
  • cryptbot_vv.txt
  • cryptbot_vv.

And placed them under the directory C:\Users\Administrator\Desktop\capa. Almost all the files we will use in this room are in the said directory.

Answer the questions below

I'm excited to learn more about CAPA!

Ready to learn Cyber Security?

The CAPA: The Basics room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.