CrowdStrike Falcon Sandbox v2 (Hybrid-Analysis)
CrowdStrike Falcon Sandbox Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.2.0 and later.
#
CrowdStrike Falcon Sandbox v2Use the CrowdStrike Falcon Sandbox integration to submit and analyze files and URLs.
This integration is backwards compatible with the CrowdStrike Falcon Sandbox integration.
#
PrerequisitesMake sure you have the API key for CrowdStrike Falcon Sandbox v2.
Each API key has an associated authorization level, which determines the available endpoints. By default, all free, non-vetted accounts can issue restricted keys. You can upgrade to full default keys, enabling file submissions and downloads.
#
Get an API KeyYou must have an account with Hybrid-Analysis. If you do not have an account, you can sign up here.
Obtain an API key by:
- In your profile page, from the top right menu navigate to the API key tab.
- Click the Create API key button.
#
Configure CrowdStrike Falcon Sandbox v2 on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for CrowdStrike Falcon Sandbox v2.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL The Server URL of the CrowdStrike Falcon Sandbox instance. By default, https://www.hybrid-analysis.com
API Key True Source Reliability Reliability of the source providing the intelligence data. True Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
Supported File Types:- PE (.exe, .scr, .pif, .dll, .com, .cpl, and so on)
- Microsoft Word (.doc, .docx, .ppt, .pps, .pptx, .ppsx, .xls, .xlsx, .rtf, .pub)
- APK
- JAR executables
- Windows Script Component (.sct)
- Windows Shortcut (.lnk)
- Windows Help (.chm)
- HTML Application (.hta)
- Windows Script File (*.wsf)
- Javascript (.js)
- Visual Basic (.vbs, .vbe)
- Shockwave Flash (.swf)
- Perl (.pl)
- PowerShell (.ps1, .psd1, .psm1)
- Scalable Vector Graphics (.svg)
- Python scripts (.py)
- Perl scripts (.pl)
- Linux ELF executables
- MIME RFC 822 (*.eml)
- Outlook (*.msg files)
The maximum file upload size is 100 MB.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
cs-falcon-sandbox-scanGets summary information for a given MD5, SHA1, or SHA256 and all the reports generated for any environment ID.
#
Base Commandcs-falcon-sandbox-scan
#
InputArgument Name | Description | Required |
---|---|---|
file | A comma-separated list of file hashes (MD5, SHA1, or SHA256). | Required |
polling | Whether to poll until there is at least one result. Possible values are: true, false. | Optional |
JobID | The JobID to check the state of when polling. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Report.job_id | String | The report job ID. |
CrowdStrike.Report.environment_id | Number | The report environment ID. |
CrowdStrike.Report.environment_description | String | The environment description. |
CrowdStrike.Report.size | Number | The file size. |
CrowdStrike.Report.type | String | The file type. |
CrowdStrike.Report.type_short | String | The short description of the file type. |
CrowdStrike.Report.target_url | String | The target url. |
CrowdStrike.Report.state | String | The report state. |
CrowdStrike.Report.error_type | String | The error type. |
CrowdStrike.Report.error_origin | String | The error origin. |
CrowdStrike.Report.submit_name | String | The name of the file when submitted |
CrowdStrike.Report.md5 | String | The MD5 hash of the file. |
CrowdStrike.Report.sha1 | String | The SHA1 hash of the file. |
CrowdStrike.Report.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.sha512 | String | The SHA512 hash of the file. |
CrowdStrike.Report.ssdeep | String | The SSDeep hash of the file. |
CrowdStrike.Report.imphash | String | The imphash hash of the file. |
CrowdStrike.Report.av_detect | Number | The AV Multiscan range, for example 50-70 (min 0, max 100). |
CrowdStrike.Report.vx_family | String | The file malware family. |
CrowdStrike.Report.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.Report.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Report.threat_score | Number | The file threat score. |
CrowdStrike.Report.interesting | Boolean | Whether the file was found to be interesting. |
CrowdStrike.Report.threat_level | Number | The file threat level. |
CrowdStrike.Report.verdict | String | The file verdict. |
CrowdStrike.Report.total_network_connections | Number | The total number of network connections. |
CrowdStrike.Report.total_processes | Number | The total number of processes. |
CrowdStrike.Report.total_signatures | Number | The total number of signatures. |
CrowdStrike.Report.file_metadata | Object | The file metadata. |
CrowdStrike.Report.submissions.submission_id | String | The submission ID. |
CrowdStrike.Report.submissions.filename | String | The name of the file. |
CrowdStrike.Report.submissions.url | String | The url. |
CrowdStrike.Report.submissions.created_at | Date | When the submission was created. |
CrowdStrike.Report.network_mode | String | The network mode. |
File.SHA256 | string | The SHA256 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.MD5 | string | The MD5 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Malicious.Vendor | string | The vendor that decided the file was malicious. |
File.Malicious.Description | string | The reason the vendor decided the file was malicious. |
DBotScore.Indicator | string | The tested indicator. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
Command example!cs-falcon-sandbox-scan file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51,9745bd652c50ac081e28981b96f41230c1ed2f84724c1e5b0f0d407a90aefe22
#
Context Example#
Human Readable Output#
Scan Results:
submit name threat level verdict total network connections total processes environment description interesting environment id url analysis analysis start time total signatures type type short sha256 file 0 whitelisted 0 0 Static Analysis false false 2020-09-15T16:47:06+00:00 0 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 samplePdf.pdf 0 no specific threat 0 0 Android Static Analysis false 200 false 2021-12-06T15:19:23+00:00 1 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 file 0 no specific threat 0 4 Windows 7 32 bit (HWP Support) false 110 false 2020-04-14T13:11:37+00:00 14 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 sample.pdf 0 no specific threat 0 4 Windows 7 64 bit false 120 false 2019-09-24T13:39:34+00:00 12 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51_1549672910345_sample.pdf 0 whitelisted 0 1 Windows 7 32 bit false 100 false 2019-02-09T01:41:57+00:00 9 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 William Stallings - Effective Cybersecurity_ A Guide to Using Best Practices and Standards-Addison-Wesley Professional (2018).pdf 0 no specific threat 0 12 Windows 7 64 bit false 120 false 2021-12-07T08:48:33+00:00 22 PDF document, version 1.4 9745bd652c50ac081e28981b96f41230c1ed2f84724c1e5b0f0d407a90aefe22
#
cs-falcon-sandbox-get-environmentsGets a list of all available environments.
#
Base Commandcs-falcon-sandbox-get-environments
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Environment.ID | number | The environment ID. |
CrowdStrike.Environment.description | string | The environment description. |
CrowdStrike.Environment.architecture | string | The environment architecture. |
CrowdStrike.Environment.VMs_total | number | The total number of virtual machines in the environment. |
CrowdStrike.Environment.VMs_busy | number | The number of busy virtual machines in the environment. |
CrowdStrike.Environment.analysisMode | string | The environment analysis mode. |
CrowdStrike.Environment.groupicon | string | The environment icon. |
#
Command example!cs-falcon-sandbox-get-environments
#
Context Example#
Human Readable Output#
Execution Environments:
_ID Description Architecture Total VMS Busy VMS Analysis mode Group icon 100 Windows 7 32 bit WINDOWS 9223372036854775807 9223372036854775807 KERNELMODE windows 110 Windows 7 32 bit (HWP Support) WINDOWS 9223372036854775807 9223372036854775807 KERNELMODE windows 120 Windows 7 64 bit WINDOWS 9223372036854775807 9223372036854775807 KERNELMODE windows 300 Linux (Ubuntu 16.04, 64 bit) LINUX 9223372036854775807 9223372036854775807 USERMODE linux 200 Android Static Analysis ANDROID 9223372036854775807 9223372036854775807 USERMODE android
#
cs-falcon-sandbox-submit-sampleSubmits a file from the investigation to the analysis server.
#
Base Commandcs-falcon-sandbox-submit-sample
#
InputArgument Name | Description | Required |
---|---|---|
entryId | The War Room entry ID. | Required |
environmentID | The environment ID. Available environment IDs: 300: "Linux (Ubuntu 16.04, 64 bit)"", 200: "Android Static Analysis", 120: "Windows 7 64 bit", 110: "Windows 7 32 bit (HWP Support)", 100: "Windows 7 32 bit". Possible values are: 100, 110, 120, 200, 300. Default is 100. | Required |
polling | Whether the command should poll until the result is ready. Possible values are: true, false. | Optional |
no_share_third_party | When set to 'true', the sample is never shared with any third party. Possible values are: true, false. | Optional |
no_hash_lookup | When set to 'true', no hash lookup is done on the sample. Possible values are: true, false. | Optional |
allow_community_access | When set to 'true', the sample is available for the community. Possible values are: true, false. | Optional |
action_script | Optional custom runtime action script. Available runtime scripts: default, default_maxantievasion, default_randomfiles, default_randomtheme, default_openie. Possible values are: default, default_maxantievasion, default_randomfiles, default_randomtheme, default_openie. | Optional |
hybrid_analysis | When set to 'false', no memory dump or memory dump analysis is done. Possible values are: true, false. | Optional |
experimental_anti_evasion | When set to 'true', sets all Kernelmode Monitor experimental anti-evasion options. Possible values are: true, false. | Optional |
script_logging | When set to 'true', sets the Kernelmode Monitor in-depth script logging engine. Possible values are: true, false. | Optional |
input_sample_tampering | When set to 'true', allows Kernelmode Monitor experimental anti-evasion options that tamper with the input sample. Possible values are: true, false. | Optional |
network_settings | Network settings. Available options: default: 'Fully operating network', tor: 'Route network traffic via TOR', simulated: 'Simulate network traffic'. Possible values are: default, tor, simulated. | Optional |
Optional email address that may be associated with the submission for notification. | Optional | |
comment | Optional comment text that may be associated with the submission/sample (Note: you can use #tags). | Optional |
custom_cmd_line | Optional command line that should be passed to the analysis file. | Optional |
custom_run_time | Optional runtime duration (in seconds). | Optional |
submit_name | Optional 'submission name' field that will be used for file type detection and analysis. Ignored unless url contains a file. | Optional |
priority | Optional priority value between 1 (lowest) and 10 (highest). By default all samples run with highest priority. Possible values are: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10. | Optional |
document_password | Optional document password used to fill in Adobe/Office password prompts. | Optional |
environment_variable | Optional system environment value. The value is provided in the format name=value. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Submit.job_id | String | The submitted report job ID. |
CrowdStrike.Submit.submission_id | String | The report submission ID. |
CrowdStrike.Submit.environment_id | Number | The report environment ID. |
CrowdStrike.Submit.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.job_id | String | The report job ID. |
CrowdStrike.Report.environment_id | Number | The report environment ID. |
CrowdStrike.Report.environment_description | String | The environment description. |
CrowdStrike.Report.size | Number | The file size. |
CrowdStrike.Report.type | String | The file type. |
CrowdStrike.Report.type_short | String | The short description of the file type. |
CrowdStrike.Report.target_url | String | The target url. |
CrowdStrike.Report.state | String | The report state. |
CrowdStrike.Report.error_type | String | The error type. |
CrowdStrike.Report.error_origin | String | The error origin. |
CrowdStrike.Report.submit_name | String | The name of the file when submitted. |
CrowdStrike.Report.md5 | String | The MD5 hash of the file. |
CrowdStrike.Report.sha1 | String | The SHA1 hash of the file. |
CrowdStrike.Report.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.sha512 | String | The SHA512 hash of the file. |
CrowdStrike.Report.ssdeep | String | The SSDeep hash of the file. |
CrowdStrike.Report.imphash | String | The imphash hash of the file. |
CrowdStrike.Report.av_detect | Number | The AV Multiscan range, for example 50-70 (min 0, max 100). |
CrowdStrike.Report.vx_family | String | The file malware family. |
CrowdStrike.Report.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.Report.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Report.threat_score | Number | The file threat score. |
CrowdStrike.Report.interesting | Boolean | Whether the file was found to be interesting. |
CrowdStrike.Report.threat_level | Number | The file threat level. |
CrowdStrike.Report.verdict | String | The file verdict. |
CrowdStrike.Report.total_network_connections | Number | The total number of network connections. |
CrowdStrike.Report.total_processes | Number | The total number of processes. |
CrowdStrike.Report.total_signatures | Number | The total number of signatures. |
CrowdStrike.Report.file_metadata | Object | The file metadata. |
CrowdStrike.Report.submissions.submission_id | String | The submission ID |
CrowdStrike.Report.submissions.filename | String | The name of the file. |
CrowdStrike.Report.submissions.url | String | The url. |
CrowdStrike.Report.submissions.created_at | Date | When the submission was created. |
CrowdStrike.Report.network_mode | String | The network mode. |
File.SHA256 | string | The SHA256 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file |
File.MD5 | string | The MD5 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Malicious.Vendor | string | The vendor that decided the file was malicious. |
File.Malicious.Description | string | The reason the vendor decided the file was malicious. |
DBotScore.Indicator | string | The tested indicator. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
cs-falcon-sandbox-searchSearches the database using the Falcon Sandbox search syntax.
#
Base Commandcs-falcon-sandbox-search
#
InputArgument Name | Description | Required |
---|---|---|
query | The Falcon Sandbox query syntax, for example url:google,host:95.181.53.78. This argument integrates all other arguments into one and cannot be given along with the other arguments. | Optional |
filename | The file name, for example invoice.exe. | Optional |
filetype | The file type. Available options: 64bits, android, assembly, bat, cmd, com, csv, data, doc, docx, elf, empty, executable, flash, html, hwp, hwpx, img, iqy, java, javascript, library, lnk, macho, mshelp, msi, native, neexe, office, outlook, pdf, pedll, peexe, perl, ppt, pptx, ps, pub, python, rtf, script, sct, sh, svg, text, url, vbe, vbs, wsf, xls, xlsx. | Optional |
filetype_desc | The file type description, for example PE32 executable. | Optional |
env_id | The environment ID. | Optional |
country | The country (3 digit ISO), for example swe. | Optional |
verdict | The search result verdict. Available options: Whitelisted, NoVerdict, NoSpecificThreat, Suspicious, Malicious. Possible values are: Whitelisted, NoVerdict, NoSpecificThreat, Suspicious, Malicious. | Optional |
av_detect | The AV Multiscan range, for example 50-70 (min 0, max 100). | Optional |
vx_family | The AV Family Substring, for example nemucod. | Optional |
limit | The max number of search results to return. Default is 10. | Optional |
tag | The hashtag, for example ransomware. | Optional |
date_from | The date from in format 'YYYY-MM-DD HH:MM', for example 2018-09-28 15:30. | Optional |
date_to | The date to in format 'YYYY-MM-DD HH:MM', for example 2018-09-28 15:30. | Optional |
port | The port, for example 8080. | Optional |
host | The host, for example 192.168.0.1. | Optional |
domain | The domain, for example checkip.dyndns.org. | Optional |
url | The HTTP request substring, for example google. | Optional |
similar_to | Similar samples, for example <sha256>. | Optional |
context | Sample context, for example <sha256>. | Optional |
imp_hash | The import hash. | Optional |
ssdeep | The SSDeep hash. | Optional |
authentihash | The file authentihash. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
File.SHA256 | string | The SHA256 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Extension | string | The file extension. |
File.MalwareFamily | String | The malware family associated with the file. |
CrowdStrike.Search.search_terms.id | String | The id of the search term. |
CrowdStrike.Search.search_terms.value | String | The value of the search term. |
CrowdStrike.Search.count | Number | The number of results for this search. |
CrowdStrike.Search.result.verdict | String | The file verdict. |
CrowdStrike.Search.result.av_detect | String | The AV Multiscan range, for example 50-70 (min 0, max 100). |
CrowdStrike.Search.result.threat_score | Number | The file threat score. |
CrowdStrike.Search.result.vx_family | String | The file malware family. |
CrowdStrike.Search.result.job_id | String | The JobID of the result. |
CrowdStrike.Search.result.sha256 | String | The sha256 hash of the file. |
CrowdStrike.Search.result.environment_id | Number | The environment ID. |
CrowdStrike.Search.result.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Search.result.submit_name | String | The name of the file. |
CrowdStrike.Search.result.environment_description | String | The environment description. |
CrowdStrike.Search.result.size | Number | The size of the file. |
CrowdStrike.Search.result.type | String | The file type. |
CrowdStrike.Search.result.type_short | String | The short description of the file type. |
#
Command example!cs-falcon-sandbox-search filename=sample.pdf
#
Context Example#
Human Readable Output#
Search Results:
Submit Name Verdict Vx Family Threat Score Sha 256 Size Environment Id Type Short Analysis Start Time sample.pdf 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 3028 300 2022-01-10T08:33:11+00:00 sample.pdf 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 3028 300 2022-01-10T07:38:29+00:00 samplePdf.pdf no specific threat 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 3506 200 2021-12-06 15:19:23 Sample.pdf no specific threat e4c0b73252211528f355e7db301da6369e69e079c6daad9e8fbb0134cc44ce27 160626 100 2021-11-30 03:00:10 sample.pdf no specific threat 2f0de9415b0e746b1189d939d84d0dd15ea93d457bd0a42ebec8b52475c2be63 468452 100 2021-11-05 17:02:53 Sample.pdf malicious RDN/Generic.cf 100 98983e00b47bcbe9ebbaf5f28ea6cdbf619dd88c91f481b18fec7ffdb68ab741 254635 120 2021-08-09 07:15:50
#
cs-falcon-sandbox-resultRetrieves result data on a file. Note: This command returns a file.
#
Base Commandcs-falcon-sandbox-result
#
InputArgument Name | Description | Required |
---|---|---|
polling | Whether the command should poll until the result is ready. Possible values are: true, false. Default is True. | Optional |
file | The file hash (MD5, SHA1, or SHA256). | Optional |
environmentID | The environment ID. Available environment IDs: 300: "Linux (Ubuntu 16.04, 64 bit)"", 200: "Android Static Analysis", 120: "Windows 7 64 bit", 110: "Windows 7 32 bit (HWP Support)", 100: "Windows 7 32 bit". Possible values are: 100, 110, 120, 200, 300. | Optional |
JobID | The file job ID to generate a report for. | Optional |
file-type | The file type. Possible values are: xml, json, html, pdf, maec, stix, misp, misp-json, openioc. Default is pdf. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Report.job_id | String | The file job ID. |
CrowdStrike.Report.environment_id | Number | The report environment ID. |
CrowdStrike.Report.environment_description | String | The environment description. |
CrowdStrike.Report.size | Number | The file size. |
CrowdStrike.Report.type | String | The file type. |
CrowdStrike.Report.type_short | String | The short description of the file type. |
CrowdStrike.Report.target_url | String | The target url. |
CrowdStrike.Report.state | String | The report state. |
CrowdStrike.Report.error_type | String | The error type. |
CrowdStrike.Report.error_origin | String | The error origin. |
CrowdStrike.Report.submit_name | String | The file name when submitted. |
CrowdStrike.Report.md5 | String | The MD5 hash of the file. |
CrowdStrike.Report.sha1 | String | The SHA1 hash of the file. |
CrowdStrike.Report.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.sha512 | String | The SHA512 hash of the file. |
CrowdStrike.Report.ssdeep | String | The SSDeep hash of the file. |
CrowdStrike.Report.imphash | String | The imphash hash of the file. |
CrowdStrike.Report.av_detect | Number | The AV Multiscan range, for example 50-70 (min 0, max 100). |
CrowdStrike.Report.vx_family | String | The file malware family. |
CrowdStrike.Report.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.Report.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Report.threat_score | Number | The file threat score. |
CrowdStrike.Report.interesting | Boolean | Whether the file was found to be interesting. |
CrowdStrike.Report.threat_level | Number | The file threat level. |
CrowdStrike.Report.verdict | String | The file verdict. |
CrowdStrike.Report.total_network_connections | Number | The total number of network connections. |
CrowdStrike.Report.total_processes | Number | The total number of processes. |
CrowdStrike.Report.total_signatures | Number | The total number of signatures. |
CrowdStrike.Report.file_metadata | Object | The file metadata. |
CrowdStrike.Report.submissions.submission_id | String | The ID of the submission. |
CrowdStrike.Report.submissions.filename | String | The name of the file. |
CrowdStrike.Report.submissions.url | String | The url. |
CrowdStrike.Report.submissions.created_at | Date | When the submission was created. |
CrowdStrike.Report.network_mode | String | The network mode. |
File.SHA256 | string | The SHA256 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.MD5 | string | The MD5 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Malicious.Vendor | string | The vendor that decided the file was malicious. |
File.Malicious.Description | string | The reason the vendor decided the file was malicious. |
DBotScore.Indicator | string | The tested indicator. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
InfoFile.Name | string | The file name. |
InfoFile.EntryID | string | The file entry ID. |
InfoFile.Size | number | The file size. |
InfoFile.Type | string | The file type, for example "PE". |
InfoFile.Info | string | Basic information about the file. |
InfoFile.Extension | string | The file extension. |
#
cs-falcon-sandbox-submit-urlSubmits a URL for analysis.
#
Base Commandcs-falcon-sandbox-submit-url
#
InputArgument Name | Description | Required |
---|---|---|
url | The URL for analysis or the URL of the file to submit. | Required |
environmentID | The environment ID. Available environment IDs: 300: "Linux (Ubuntu 16.04, 64 bit)"", 200: "Android Static Analysis", 120: "Windows 7 64 bit", 110: "Windows 7 32 bit (HWP Support)", 100: "Windows 7 32 bit". Possible values are: 100, 110, 120, 200, 300. Default is 100. | Required |
polling | Whether the command should poll until the result is ready. Possible values are: true, false. | Optional |
no_share_third_party | When set to 'true', the sample is never shared with any third party. Possible values are: true, false. | Optional |
no_hash_lookup | When set to 'true', no hash lookup is done on the sample. Possible values are: true, false. | Optional |
allow_community_access | When set to 'true', the sample is available for the community. Possible values are: true, false. | Optional |
action_script | Optional custom runtime action script. Available runtime scripts: default, default_maxantievasion, default_randomfiles, default_randomtheme, default_openie. Possible values are: default, default_maxantievasion, default_randomfiles, default_randomtheme, default_openie. | Optional |
hybrid_analysis | When set to 'false', no memory dump or memory dump analysis is done. Possible values are: true, false. | Optional |
experimental_anti_evasion | When set to 'true', sets all Kernelmode Monitor experimental anti-evasion options. Possible values are: true, false. | Optional |
script_logging | When set to 'true', sets the Kernelmode Monitor in-depth script logging engine. Possible values are: true, false. | Optional |
input_sample_tampering | When set to 'true', allows Kernelmode Monitor experimental anti-evasion options that tamper with the input sample. Possible values are: true, false. | Optional |
network_settings | Network settings. Available options: default: 'Fully operating network', tor: 'Route network traffic via TOR', simulated: 'Simulate network traffic'. Possible values are: default, tor, simulated. | Optional |
Optional email address that may be associated with the submission for notification. | Optional | |
comment | Optional comment text that may be associated with the submission/sample (Note: you can use #tags). | Optional |
custom_cmd_line | Optional command line that should be passed to the analysis file. | Optional |
custom_run_time | Optional runtime duration (in seconds). | Optional |
submit_name | Optional 'submission name' field that will be used for file type detection and analysis. Ignored unless url contains a file. | Optional |
priority | Optional priority value between 1 (lowest) and 10 (highest). By default all samples run with highest priority. Possible values are: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10. | Optional |
document_password | Optional document password used to fill in Adobe/Office password prompts. | Optional |
environment_variable | Optional system environment value. The value is provided in the format name=value. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Submit.job_id | String | The The submitted report job ID. |
CrowdStrike.Submit.submission_type | String | The type of the submission. |
CrowdStrike.Submit.submission_id | String | The submission ID. |
CrowdStrike.Submit.environment_id | Number | The submission environment ID. |
CrowdStrike.Submit.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.job_id | String | The report job ID. |
CrowdStrike.Report.environment_id | Number | The report environment ID. |
CrowdStrike.Report.environment_description | String | The environment description. |
CrowdStrike.Report.size | Number | The file size. |
CrowdStrike.Report.type | String | The file type. |
CrowdStrike.Report.type_short | String | The short description of the file type. |
CrowdStrike.Report.target_url | String | The target url. |
CrowdStrike.Report.state | String | The report state. |
CrowdStrike.Report.error_type | String | The error type. |
CrowdStrike.Report.error_origin | String | The error origin. |
CrowdStrike.Report.submit_name | String | The file name when submitted. |
CrowdStrike.Report.md5 | String | The MD5 hash of the file. |
CrowdStrike.Report.sha1 | String | The SHA1 hash of the file. |
CrowdStrike.Report.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.sha512 | String | The SHA512 hash of the file. |
CrowdStrike.Report.ssdeep | String | The SSDeep hash of the file. |
CrowdStrike.Report.imphash | String | The imphash hash of the file. |
CrowdStrike.Report.av_detect | Number | The AV Multiscan range, for example 50-70 (min 0, max 100) |
CrowdStrike.Report.vx_family | String | The file malware famil. |
CrowdStrike.Report.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.Report.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Report.threat_score | Number | The file threat score. |
CrowdStrike.Report.interesting | Boolean | Whether the file was found to be interesting. |
CrowdStrike.Report.threat_level | Number | The file threat level. |
CrowdStrike.Report.verdict | String | The file verdict. |
CrowdStrike.Report.total_network_connections | Number | The total number of network connections. |
CrowdStrike.Report.total_processes | Number | The total number of processes. |
CrowdStrike.Report.total_signatures | Number | The total number of signatures. |
CrowdStrike.Report.file_metadata | Object | The file metadata. |
CrowdStrike.Report.submissions.submission_id | String | The submission ID. |
CrowdStrike.Report.submissions.filename | String | The name of the file. |
CrowdStrike.Report.submissions.url | String | The url. |
CrowdStrike.Report.submissions.created_at | Date | When the submission was created. |
CrowdStrike.Report.network_mode | String | The network mode. |
File.SHA256 | string | The SHA256 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.MD5 | string | The MD5 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Malicious.Vendor | string | The vendor that decided the file was malicious. |
File.Malicious.Description | string | The reason the vendor decided the file was malicious. |
DBotScore.Indicator | string | The tested indicator. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
Command example!cs-falcon-sandbox-submit-url url=example.com environmentID=300
#
Context Example#
Human Readable Output#
Scan Results:
submit name threat level verdict total network connections total processes environment description interesting url analysis analysis start time total signatures sha256 http://example.com/ 1 suspicious 0 0 Static Analysis false true 2020-02-03T08:39:15+00:00 0 0b1d27c7ef8651eac6933608d4cb0a4b9fd74c45b883d5a4da1eeaa540f6cc5c
#
cs-falcon-sandbox-get-screenshotsRetrieves screenshots from a report
#
Base Commandcs-falcon-sandbox-get-screenshots
#
InputArgument Name | Description | Required |
---|---|---|
file | The sha256 hash of a file. | Optional |
environmentID | The environment ID. Available environment IDs: 300: "Linux (Ubuntu 16.04, 64 bit)"", 200: "Android Static Analysis", 120: "Windows 7 64 bit", 110: "Windows 7 32 bit (HWP Support)", 100: "Windows 7 32 bit". Possible values are: 100, 110, 120, 200, 300. | Optional |
JobID | The file job ID. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
InfoFile.Name | string | The file name. |
InfoFile.EntryID | string | The file entry ID. |
InfoFile.Size | number | The file size. |
InfoFile.Type | string | The file type, for example "PE". |
InfoFile.Info | string | Basic information about the file. |
InfoFile.Extension | string | The file extension. |
#
Command example!cs-falcon-sandbox-get-screenshots file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 environmentID=100
#
Context Example#
Human Readable Output#
cs-falcon-sandbox-analysis-overviewGets the hash overview.
#
Base Commandcs-falcon-sandbox-analysis-overview
#
InputArgument Name | Description | Required |
---|---|---|
file | The SHA256 hash of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.AnalysisOverview.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.AnalysisOverview.last_file_name | String | The last name of the file. |
CrowdStrike.AnalysisOverview.threat_score | Number | The file threat score. |
CrowdStrike.AnalysisOverview.verdict | String | The file verdict. |
CrowdStrike.AnalysisOverview.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.AnalysisOverview.size | Number | The size of the file. |
CrowdStrike.AnalysisOverview.type | String | The file type. |
CrowdStrike.AnalysisOverview.type_short | String | The short description of the file type. |
CrowdStrike.AnalysisOverview.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.AnalysisOverview.last_multi_scan | Date | The last multi-scan. |
CrowdStrike.AnalysisOverview.architecture | String | The environment architecture. |
CrowdStrike.AnalysisOverview.multiscan_result | Number | The multi-scan result. |
CrowdStrike.AnalysisOverview.scanners.name | String | The name of the scanner. |
CrowdStrike.AnalysisOverview.scanners.status | String | The status of the scanner. |
CrowdStrike.AnalysisOverview.scanners.error_message | String | The error message. |
CrowdStrike.AnalysisOverview.scanners.progress | Number | The progress of the scanner. |
CrowdStrike.AnalysisOverview.scanners.total | Number | The total number of scanners. |
CrowdStrike.AnalysisOverview.scanners.positives | Number | The number of positives. |
CrowdStrike.AnalysisOverview.scanners.percent | Number | The percent of the scanner. |
CrowdStrike.AnalysisOverview.scanners.anti_virus_results.name | String | The name of the antivirus results. |
CrowdStrike.AnalysisOverview.scanners.anti_virus_results.result | Boolean | The antivirus result. |
CrowdStrike.AnalysisOverview.scanners.anti_virus_results.threat_found | String | The threat found the the scanner. |
CrowdStrike.AnalysisOverview.reports | String | The reports of the analysis. |
CrowdStrike.AnalysisOverview.whitelisted | Boolean | If the result is whitelisted. |
CrowdStrike.AnalysisOverview.children_in_queue | Number | The number of children in queue. |
CrowdStrike.AnalysisOverview.children_in_progress | Number | The number of children in progress. |
File.Size | number | The file size. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Name | string | The file name. |
File.type | string | The file type. |
#
Command example!cs-falcon-sandbox-analysis-overview file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
Context Example#
Human Readable Output#
Analysis Overview:
Last File Name Other File Name Sha 256 Verdict Url Analysis Size Type Type Short file 5_Journals_3_Manuscripts_10_Version_1_Revision_0_CoverLetter.pdf,
dyUQ2JAbImyU0WNH7TI1K3UYqUwDMsQBh1RwXWHG.pdf,
k18zpzsrq3om4q1pu18mftdo2caaivqq.pdf,
kuc86odvmimp0vd0tseubdekn9dg41jrff6lso01_parsed.eml,
sample.pdf,
samplePdf.pdf,
test.pdf8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 whitelisted false 3506 PDF document, version 1.3
#
cs-falcon-sandbox-analysis-overview-summaryReturns the hash overview.
#
Base Commandcs-falcon-sandbox-analysis-overview-summary
#
InputArgument Name | Description | Required |
---|---|---|
file | The SHA256 hash of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.AnalysisOverviewSummary.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.AnalysisOverviewSummary.threat_score | Number | The file threat score. |
CrowdStrike.AnalysisOverviewSummary.verdict | String | The file verdict. |
CrowdStrike.AnalysisOverviewSummary.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.AnalysisOverviewSummary.last_multi_scan | Date | The last multi-scan. |
CrowdStrike.AnalysisOverviewSummary.multiscan_result | Number | The multi-scan result. |
#
Command example!cs-falcon-sandbox-analysis-overview-summary file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
Context Example#
Human Readable Output#
Analysis Overview Summary:
Analysis Start Time Last Multi Scan Multiscan Result Sha256 Verdict 2022-01-10T08:33:11+00:00 2022-02-07T12:52:10+00:00 0 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 whitelisted
#
cs-falcon-sandbox-analysis-overview-refreshRefreshes the overview and downloads fresh data from external services.
#
Base Commandcs-falcon-sandbox-analysis-overview-refresh
#
InputArgument Name | Description | Required |
---|---|---|
file | The SHA256 hash of the file. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!cs-falcon-sandbox-analysis-overview-refresh file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
Human Readable OutputThe request to refresh the analysis overview was sent successfully.
#
fileReturns file information and reputation.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | A comma-separated list of file hashes (MD5, SHA1, or SHA256). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.Report.job_id | String | The file job ID. |
CrowdStrike.Report.environment_id | Number | The report environment ID. |
CrowdStrike.Report.environment_description | String | The environment description. |
CrowdStrike.Report.size | Number | The file size. |
CrowdStrike.Report.type | String | The file type. |
CrowdStrike.Report.type_short | String | The short description of the file type. |
CrowdStrike.Report.target_url | String | The target url. |
CrowdStrike.Report.state | String | The report state. |
CrowdStrike.Report.error_type | String | The error type. |
CrowdStrike.Report.error_origin | String | The error origin. |
CrowdStrike.Report.submit_name | String | The file name when submitted. |
CrowdStrike.Report.md5 | String | The MD5 hash of the file. |
CrowdStrike.Report.sha1 | String | The SHA1 hash of the file. |
CrowdStrike.Report.sha256 | String | The SHA256 hash of the file. |
CrowdStrike.Report.sha512 | String | The SHA512 hash of the file. |
CrowdStrike.Report.ssdeep | String | The SSDeep hash of the file. |
CrowdStrike.Report.imphash | String | The imphash hash of the file. |
CrowdStrike.Report.av_detect | Number | The AV Multiscan range, for example 50-70 (min 0, max 100). |
CrowdStrike.Report.vx_family | String | The file malware family. |
CrowdStrike.Report.url_analysis | Boolean | Whether this report is url analysis. |
CrowdStrike.Report.analysis_start_time | Date | The start time of the analysis. |
CrowdStrike.Report.threat_score | Number | The file threat score. |
CrowdStrike.Report.interesting | Boolean | Whether the file was found to be interesting. |
CrowdStrike.Report.threat_level | Number | The file threat level. |
CrowdStrike.Report.verdict | String | The file verdict. |
CrowdStrike.Report.total_network_connections | Number | The total number of network connections. |
CrowdStrike.Report.total_processes | Number | The total number of processes. |
CrowdStrike.Report.total_signatures | Number | The total number of signatures. |
CrowdStrike.Report.file_metadata | Object | The file metadata. |
CrowdStrike.Report.submissions.submission_id | String | The submission ID. |
CrowdStrike.Report.submissions.filename | String | The name of the file. |
CrowdStrike.Report.submissions.url | String | The url. |
CrowdStrike.Report.submissions.created_at | Date | When the submission was created. |
CrowdStrike.Report.network_mode | String | The network mode. |
File.SHA256 | string | The SHA256 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.MD5 | string | The MD5 hash of the file. |
File.Name | string | The file submission name. |
File.MalwareFamily | string | The file family classification. |
File.Malicious.Vendor | string | The vendor that decided the file was malicious. |
File.Malicious.Description | string | The reason the vendor decided the file was malicious. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
Command example!file file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
Context Example#
Human Readable Output#
Scan Results:
submit name threat level verdict total network connections total processes environment description interesting environment id url analysis analysis start time total signatures type type short sha256 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51_1549672910345_sample.pdf 0 whitelisted 0 1 Windows 7 32 bit false 100 false 2019-02-09T01:41:57+00:00 9 PDF document, version 1.3 8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
cs-falcon-sandbox-sample-downloadDownloads the sample file.
#
Base Commandcs-falcon-sandbox-sample-download
#
InputArgument Name | Description | Required |
---|---|---|
file | The SHA256 hash of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.SHA512 | String | The SHA512 hash of the file. |
File.SSDeep | String | The SSDeep hash of the file. |
File.EntryID | String | The file entry ID. |
File.Info | String | Information about the file. |
File.Type | String | The file type. |
File.MD5 | String | The MD5 hash of the file. |
File.Extension | String | The file extension. |
#
Command example!cs-falcon-sandbox-sample-download file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51
#
Context Example#
cs-falcon-sandbox-report-stateGets the report state for the given ID.
#
Base Commandcs-falcon-sandbox-report-state
#
InputArgument Name | Description | Required |
---|---|---|
JobID | The file job ID. | Optional |
environmentID | The environment ID. Available environment IDs: 300: "Linux (Ubuntu 16.04, 64 bit)"", 200: "Android Static Analysis", 120: "Windows 7 64 bit", 110: "Windows 7 32 bit (HWP Support)", 100: "Windows 7 32 bit". Possible values are: 100, 110, 120, 200, 300. | Optional |
file | The hash of the file. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CrowdStrike.State.state | String | The state of the report. |
CrowdStrike.State.error_type | String | The error type of the report. |
CrowdStrike.State.error_origin | String | The error origin. |
CrowdStrike.State.error | String | The error description. |
#
Command example!cs-falcon-sandbox-report-state file=8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51 environmentID=300
#
Context Example#
Human Readable Output#
State
Error Error Origin Error Type Related Reports State The requested environment ID "300" and file type "pdf" have no available execution environment CLIENT FILE_TYPE_BAD_ERROR ERROR