ANY.RUN TI Lookup
ANY.RUN Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
TI Lookup is a searchable database of IOCs, IOAs, IOBs, and events for threat hunting and a service for browsing malicious files by their content.
#
Use CasesPerform deep searches, look up threats online, and enrich your security solutions.
#
Generate API token- Follow ANY.RUN Sandbox
- [1] Profile > [2] API and Limits > [3] Generate > [4] Copy
#
Configure ANY.RUN Lookup in Cortex- Navigate to Settings > Integrations > Servers & Services.
- Search for ANY.RUN.
- Click Add instance to create and configure a new integration instance.
- Insert ANY.RUN API-KEY into the Password parameter
- Click Test to validate the URLs, token, and connection.
Parameter | Description | Required |
---|---|---|
Password | ANY.RUN API-KEY without prefix | True |
Server's FQDN | Go to Settings & Info → Settings → Integrations → API Keys. Click Copy API URL. Your FQDN is saved in the clipboard. Inline it without http/https protocol | True |
XSOAR API-KEY ID | In the API Keys table, locate the ID field. Note your corresponding ID number | True |
XSOAR API-KEY | XSOAR API-KEY | True |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
anyrun-get-intelligencePerform threat intelligence using specified IOC
#
Base Commandanyrun-get-intelligence
#
InputArgument Name | Description | Required |
---|---|---|
lookup_depth | Specify the number of days from the current date for which you want to lookup. | Optional |
query | Raw query with necessary filters. Supports condition concatenation with AND, OR, NOT and Parentheses (). | Optional |
threat_name | The name of a particular threat: malware family, threat type, etc., as identified by the sandbox. Example: "Phishing". | Optional |
threat_level | A verdict on the threat level of the sample. Possible values are: suspicious, malicious, info. | Optional |
task_type | The type of the sample submitted to the sandbox. Possible values are: File, URL. | Optional |
submission_country | The country from which the threat sample was submitted. Example: "es". | Optional |
os | The specific version of Windows used in the environment. Possible values are: Windows 7, Windows 8, Windows 11. | Optional |
os_software_set | The software package of applications installed on the OS. Possible values are: clean, office, complete. | Optional |
os_bit_version | The bitness of the operating system. Possible values are: 32, 64. | Optional |
registry_key | The specific key within the registry hive where the modification occurred. Please note: when entering registry keys, use a double backslash () to escape the single backslash. Example: "Windows\CurrentVersion\RunOnce. | Optional |
registry_name | The name of the Windows Registry key field. Example: "browseinplace". | Optional |
registry_value | The value of the Windows Registry key. Example: "Internet Explorer\iexplore.exe. | Optional |
module_image_path | The full path to the module’s image file, the location on the disk where the module’s executable is stored. Example: "SysWOW64\cryptbase.dll. | Optional |
rule_threat_level | The threat level assigned to a particular event. Possible values are: suspicious, malicious, info. | Optional |
rule_name | The name of the detection rule. Example: "Executable content was dropped or overwritten". | Optional |
mitre | Techniques used by the malware according to the MITRE ATT&CK classification. Example: "T1071". | Optional |
image_path | Full path to process image. Example: "System32\conhost.exe". | Optional |
command_line | Full command line that initiated the process. Example: "PDQConnectAgent\pdq-connect-agent.exe –service". | Optional |
injected_flag | Indication of whether a process has been injected. Possible values are: true, false. | Optional |
destination_ip | The IP address of the network connection that was established or attempted. | Optional |
destination_port | The network port through which the connection was established. Example: "49760". | Optional |
destination_ip_asn | Detected ASN. Example: "akamai-as". | Optional |
destination_ip_geo | Two-letter country or region code of the detected IP geolocation. Example: "ae". | Optional |
domain_name | The domain name that was recorded during the threat execution in a sandbox. Example: "tventyvd20sb.top". | Optional |
ja3 | Types of TLS fingerprints that can indicate certain threats. | Optional |
ja3s | Types of TLS fingerprints that can indicate certain threats. | Optional |
jarm | Types of TLS fingerprints that can indicate certain threats. | Optional |
file_path | The full path to the file on the system. | Optional |
file_event_path | The path of a file associated with a file event. | Optional |
file_extension | The extension that indicates the file type. | Optional |
sha256 | Hash values relating to a file. | Optional |
sha1 | Hash values relating to a file. | Optional |
md5 | Hash values relating to a file. | Optional |
suricata_class | The category assigned to the threat by Suricata based on its characteristics. Example: "a network trojan was detected". | Optional |
suricata_message | The description of the threat according to Suricata. Example: "ET INFO 404/Snake/Matiex Keylogger Style External IP Check". | Optional |
suricata_threat_level | The verdict on the threat according to Suricata based on its potential impact. Possible values are: suspicious, malicious, info. | Optional |
suricata_id | The unique identifier of the Suricata rule: Example: "2044767". | Optional |
sync_object_name | The name or identifier of the synchronization object used. Example: "rmc". | Optional |
sync_object_type | The type of synchronization object used. Example: "mutex". | Optional |
sync_object_operation | The operation performed on the synchronization object. Example: "create". | Optional |
url | The URL called by the process. | Optional |
http_request_content_type | The content type of the HTTP request sent to the server. Example: "application/json". | Optional |
http_response_content_type | The content type of the HTTP response received from the server. Example: "text/html". | Optional |
http_request_file_type | The file type of the file being uploaded in the HTTP request. Example: "binary". | Optional |
http_response_file_type | The file type of the file being downloaded in the HTTP response. Example: "binary". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ANYRUN.Lookup.destinationPort | Unknown | Destination ports numbers. |
ANYRUN.Lookup.destinationIPgeo | Unknown | Destination IP Geo (countries). |
ANYRUN.Lookup.destinationIpAsn.asn | String | Destination IP ASN (autonomous system number). |
ANYRUN.Lookup.destinationIpAsn.date | Date | Destination IP ASN Date. |
ANYRUN.Lookup.relatedTasks | String | Links to related tasks in ANY.RUN sandbox. |
ANYRUN.Lookup.threatName | String | Threat names. |
ANYRUN.Lookup.relatedIncidents.task | String | Link to the task in ANY.RUN sandbox. |
ANYRUN.Lookup.relatedIncidents.time | Date | Creation time. |
ANYRUN.Lookup.relatedIncidents.MITRE | Unknown | Array of MITRE matrix techniques IDs ans sub-techniques IDs. |
ANYRUN.Lookup.relatedIncidents.event.destinationPort | String | Destination ports numbers. |
ANYRUN.Lookup.relatedIncidents.event.destinationIP | String | Destination IP address. |
ANYRUN.Lookup.relatedIncidents.process.commandLine | String | Command line string. |
ANYRUN.Lookup.relatedIncidents.process.imagePath | String | Image path string. |
ANYRUN.Lookup.relatedIncidents.process.threatName | String | Threat names. |
ANYRUN.Lookup.relatedIncidents.process.MITRE | Unknown | Array of MITRE matrix techniques IDs ans sub-techniques IDs. |
ANYRUN.Lookup.relatedIncidents.process.pid | Number | Process ID. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.known_threat | Boolean | Indicates if it is a known threat. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.network_loader | Boolean | Indicates if network download was detected. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.network | Boolean | Indicates if network activity was enabled. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.uac_request | Boolean | Indicates if User Access Control (UAC) request was detected. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.injects | Boolean | Indicates if threat uses injections. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.service_luncher | Boolean | Indicates if new service registration was detected. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.executable_dropped | Boolean | Indicates if threat uses dropped executables. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.multiprocessing | Boolean | Indicates if threat uses multiprocessing. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.crashed_apps | Boolean | Indicates if application crashed. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.debug_output | Boolean | Indicates if application has debug output message. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.stealing | Boolean | Indicates if process steals info from infected machine. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.exploitable | Boolean | Indicates if any known exploit was detected. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.static_detections | Boolean | Indicates if any malicious pattern was detected by static analysis engine. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.susp_struct | Boolean | Is susp struct |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.autostart | Boolean | Indicates if application was added to autostart. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.low_access | Boolean | Indicates if threat uses low level access. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.tor | Boolean | Indicates if TOR was used. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.spam | Boolean | Indicates if spam was detected. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.malware_config | Boolean | Indicates if malware config was extracted from submitted file. |
ANYRUN.Lookup.relatedIncidents.process.scores.specs.process_dump | Boolean | Indicates if the process memory dump can be extracted. |
ANYRUN.Lookup.relatedIncidents.process.eventsCounters.raw.registry | Number | Number or registry events. |
ANYRUN.Lookup.relatedIncidents.process.eventsCounters.raw.files | Number | Number or files. |
ANYRUN.Lookup.relatedIncidents.process.eventsCounters.raw.modules | Number | Number or modules. |
ANYRUN.Lookup.relatedIncidents.process.eventsCounters.raw.objects | Number | Number or objects. |
ANYRUN.Lookup.relatedIncidents.process.threatLevel | Number | Threat level. |
ANYRUN.Lookup.relatedIncidents.event.destinationIpAsn | String | Destination IP ASN (autonomous system number). |
ANYRUN.Lookup.relatedIncidents.event.title | String | Title of event type. |
ANYRUN.Lookup.relatedIncidents.event.url | String | URL. |
ANYRUN.Lookup.relatedIncidents.event.domainName | String | Domain name |
ANYRUN.Lookup.relatedIncidents.event.ruleThreatLevel | String | Rule threat level. |
ANYRUN.Lookup.destinationIP.destinationIP | String | Destination IP address. |
ANYRUN.Lookup.destinationIP.date | Date | Creation date. |
ANYRUN.Lookup.destinationIP.threatLevel | Number | Threat level. |
ANYRUN.Lookup.destinationIP.threatName | Unknown | Threat names. |
ANYRUN.Lookup.destinationIP.isMalconf | Boolean | Indicates if the IOC was extracted from malware configuration. |
ANYRUN.Lookup.relatedFiles.task | String | Link to the task in ANY.RUN sandbox. |
ANYRUN.Lookup.relatedFiles.fileLink | String | Link to the HTTP response files. |
ANYRUN.Lookup.relatedFiles.time | Date | Creation date. |
ANYRUN.Lookup.relatedFiles.process.commandLine | String | Command line string. |
ANYRUN.Lookup.relatedFiles.process.imagePath | String | Image path string. |
ANYRUN.Lookup.relatedFiles.process.MITRE | String | Array of MITRE matrix techniques IDs ans sub-techniques IDs. |
ANYRUN.Lookup.relatedFiles.process.pid | Number | Process ID. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.known_threat | Boolean | Indicates if it is a known threat. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.network_loader | Boolean | Indicates if network download was detected. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.network | Boolean | Indicates if network activity was enabled. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.uac_request | Boolean | Indicates if User Access Control (UAC) request was detected. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.injects | Boolean | Indicates if threat uses injections. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.service_luncher | Boolean | Indicates if new service registration was detected. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.executable_dropped | Boolean | Indicates if threat uses dropped executables. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.multiprocessing | Boolean | Indicates if threat uses multiprocessing. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.crashed_apps | Boolean | Indicates if application crashed. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.debug_output | Boolean | Indicates if application has debug output message. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.stealing | Boolean | Indicates if process steals info from infected machine. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.exploitable | Boolean | Indicates if any known exploit was detected. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.static_detections | Boolean | Indicates if any malicious pattern was detected by static analysis engine. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.susp_struct | Boolean | Is susp struct. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.autostart | Boolean | Indicates if application was added to autostart. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.low_access | Boolean | Indicates if threat uses low level access. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.tor | Boolean | Indicates if TOR was used. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.spam | Boolean | Indicates if spam was detected. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.malware_config | Boolean | Indicates if malware config was extracted from submitted file. |
ANYRUN.Lookup.relatedFiles.process.eventsCounters.raw.registry | Number | Number or registry events. |
ANYRUN.Lookup.relatedFiles.process.eventsCounters.raw.files | Number | Number or files. |
ANYRUN.Lookup.relatedFiles.process.eventsCounters.raw.modules | Number | Number or modules. |
ANYRUN.Lookup.relatedFiles.process.eventsCounters.raw.objects | Number | Number or objects. |
ANYRUN.Lookup.relatedFiles.process.threatLevel | Number | Threat level. |
ANYRUN.Lookup.relatedFiles.hashes.md5 | String | MD5 hash string. |
ANYRUN.Lookup.relatedFiles.hashes.sha1 | String | SHA1 hash string. |
ANYRUN.Lookup.relatedFiles.hashes.sha256 | String | SHA256 hash string. |
ANYRUN.Lookup.relatedFiles.hashes.ssdeep | String | Ssdeep hash string. |
ANYRUN.Lookup.relatedFiles.process.threatName | String | Threat name. |
ANYRUN.Lookup.relatedFiles.process.scores.specs.process_dump | Boolean | Indicates if the process memory dump can be extracted. |
ANYRUN.Lookup.relatedDNS.domainName | String | Domain name. |
ANYRUN.Lookup.relatedDNS.threatName | Unknown | Threat name. |
ANYRUN.Lookup.relatedDNS.threatLevel | Number | Threat level. |
ANYRUN.Lookup.relatedDNS.date | Date | Creation date. |
ANYRUN.Lookup.relatedDNS.isMalconf | Boolean | Indicates if the IOC was extracted from malware configuration. |
ANYRUN.Lookup.relatedURLs.url | String | URL. |
ANYRUN.Lookup.relatedURLs.date | Date | Creation date. |
ANYRUN.Lookup.relatedURLs.threatLevel | Number | Threat level. |
ANYRUN.Lookup.relatedURLs.threatName | Unknown | Threat names. |
ANYRUN.Lookup.relatedURLs.isMalconf | Boolean | Indicates if the IOC was extracted from malware configuration. |
ANYRUN.Lookup.sourceTasks.uuid | String | Task UUID. |
ANYRUN.Lookup.sourceTasks.related | String | Link to the task in ANY.RUN sandbox. |
ANYRUN.Lookup.sourceTasks.date | Date | Task creation time. |
ANYRUN.Lookup.sourceTasks.threatLevel | Number | Threat level. |
ANYRUN.Lookup.sourceTasks.tags | Unknown | Tags. |
ANYRUN.Lookup.sourceTasks.mainObject.type | String | Type. |
ANYRUN.Lookup.sourceTasks.mainObject.name | String | Name. |
ANYRUN.Lookup.sourceTasks.mainObject.hashes.md5 | String | MD5 hash string. |
ANYRUN.Lookup.sourceTasks.mainObject.hashes.sha1 | String | SHA1 hash string. |
ANYRUN.Lookup.sourceTasks.mainObject.hashes.sha256 | String | SHA256 hash string. |
ANYRUN.Lookup.sourceTasks.mainObject.hashes.ssdeep | String | Ssdeep hash string. |
ANYRUN.Lookup.relatedSynchronizationObjects.syncObjectTime | Date | Time. |
ANYRUN.Lookup.relatedSynchronizationObjects.syncObjectType | String | Type. |
ANYRUN.Lookup.relatedSynchronizationObjects.syncObjectOperation | String | Operation. |
ANYRUN.Lookup.relatedSynchronizationObjects.syncObjectName | String | Name. |
ANYRUN.Lookup.relatedSynchronizationObjects.task | String | Task link. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.commandLine | String | Command line string. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.imagePath | String | Image path string. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.MITRE | Unknown | Array of MITRE matrix techniques IDs ans sub-techniques IDs. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.pid | Number | Process ID. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.known_threat | Boolean | Indicates if it is a known threat. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.network_loader | Boolean | Indicates if network download was detected. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.network | Boolean | Indicates if network activity was enabled. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.uac_request | Boolean | Indicates if User Access Control (UAC) request was detected. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.injects | Boolean | Indicates if threat uses injections. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.service_luncher | Boolean | Indicates if new service registration was detected. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.executable_dropped | Boolean | Indicates if threat uses dropped executables. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.multiprocessing | Boolean | Indicates if threat uses multiprocessing. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.crashed_apps | Boolean | Indicates if application crashed. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.debug_output | Boolean | Indicates if application has debug output message. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.stealing | Boolean | Indicates if process steals info from infected machine. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.exploitable | Boolean | Indicates if any known exploit was detected. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.static_detections | Boolean | Indicates if any malicious pattern was detected by static analysis engine |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.susp_struct | Boolean | Is susp struct. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.autostart | Boolean | Indicates if application was added to autostart |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.low_access | Boolean | Indicates if threat uses low level access. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.tor | Boolean | Indicates if TOR was used. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.spam | Boolean | Indicates if spam was detected. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.malware_config | Boolean | Indicates if malware config was extracted from submitted file. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.eventsCounters.raw.registry | Number | Number or registry events. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.eventsCounters.raw.files | Number | Number or files. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.eventsCounters.raw.modules | Number | Number or modules. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.eventsCounters.raw.objects | Number | Number or objects. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.threatLevel | Number | Threat level. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.threatName | String | Threat name. |
ANYRUN.Lookup.relatedSynchronizationObjects.process.scores.specs.process_dump | Boolean | Indicates if the process memory dump can be extracted. |
ANYRUN.Lookup.relatedNetworkThreats.suricataClass | String | Suricata class. |
ANYRUN.Lookup.relatedNetworkThreats.imagePath | String | Image path. |
ANYRUN.Lookup.relatedNetworkThreats.suricataID | String | SID. |
ANYRUN.Lookup.relatedNetworkThreats.suricataMessage | String | Suricata message. |
ANYRUN.Lookup.relatedNetworkThreats.tags | Unknown | Tags. |
ANYRUN.Lookup.relatedNetworkThreats.MITRE | Unknown | Array of MITRE matrix techniques IDs ans sub-techniques IDs. |
ANYRUN.Lookup.relatedNetworkThreats.suricataThreatLevel | String | Suricata threat level. |
ANYRUN.Lookup.relatedNetworkThreats.task | String | Task link. |
ANYRUN.Lookup.summary.threatLevel | Number | Threat level. |
ANYRUN.Lookup.summary.lastSeen | Date | Last Seen Date |
ANYRUN.Lookup.summary.detectedType | String | Detected type. |
ANYRUN.Lookup.summary.isTrial | Boolean | Is trial request. |
ANYRUN.Lookup.summary.tags | String | Tags. |
ANYRUN.Lookup.summary.details.type | String | IOC type. |
ANYRUN.Lookup.summary.details.threatLevel | Number | Threat level. |
ANYRUN.Lookup.summary.details.lastSeen | Date | Last Seen Date |
ANYRUN.Lookup.summary.details.count | Number | Count of iocs/objects by threat level |