Analysis
-
max time kernel
75s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
Capitalism_Lab_Installer.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Capitalism_Lab_Installer.exe
Resource
win10v2004-20220812-en
General
-
Target
Capitalism_Lab_Installer.exe
-
Size
236.5MB
-
MD5
e48861934da06b3edb02b330ebc2b202
-
SHA1
db7296bc29beb178ee847e4f89d99f0819d7059c
-
SHA256
34e1f26fd65175ff58aa68cca0097e0206669a72715a502e20c5fb218b95dcd3
-
SHA512
ab35ddd182eaf854e225909b9b753195af5029cfa7f63b64e0c1e753f80b6b47b6674531cab04b5d0d881e7b0fd8f51b0e7e01e9269cdad3337fe554d46dbc84
-
SSDEEP
6291456:5ZvnhKKaCbzWPAxr8TDwTInH44/+ofXu3m3:/vhkAxrotY4/+ofXu23
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4860 Capitalism_Lab_Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5eee2912bd1ee421cf1f1dfb1cc327d97
SHA1c5d3741ddb195718c9b17923eb6abfb7a732bdc1
SHA256e560384c5298ee2123e8340e716b2c4680f51b4d0347995ba3290dbd1130c6c0
SHA5121808a068386c790d8ad5096d9fededcfa6e5688e3a68f2499418456c9cafd7b837c811298e6570212155b4a3d6038c1749cfcd9d1b86f090f66d1a5301adecb2