Intezer v2
This Integration is part of the Intezer Pack.#
Use the Intezer v2 integration to detect and analyze malware, based on code reuse.
Configure Intezer v2 in Cortex#
| Parameter | Description | Required |
|---|---|---|
| API Key | True | |
| Intezer Analyze Base URL | The API address to intezer Analyze - i.e. https://analyze.intezer.com/api/ | False |
| Use system proxy settings | False | |
| Trust any certificate (not secure) | False |
Commands#
You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
intezer-analyze-by-hash#
Checks file reputation of the given hash, supports SHA256, SHA1 and MD5
Base Command#
intezer-analyze-by-hash
Input#
| Argument Name | Description | Required |
|---|---|---|
| file_hash | Hash of the file to query. Supports SHA256, MD5 and SHA1. | Required |
| wait_for_result | Waits for analysis result, support polling | Optional |
| interval | Number of seconds between poll requests | Optional |
| timeout | Number of seconds until polling timeout | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | Intezer analysis id |
| Intezer.Analysis.Status | string | status of the analysis |
| Intezer.Analysis.Type | string | type of the analysis |
Command Example#
Context Example#
Human Readable Output#
intezer-analyze-url#
Checks file reputation of the given URL
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
Base Command#
intezer-analyze-url
Input#
| Argument Name | Description | Required |
|---|---|---|
| Url | Url to query. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | Intezer analysis id |
| Intezer.Analysis.Status | string | status of the analysis |
| Intezer.Analysis.Type | string | type of the analysis |
| URL.Data | string | The submitted Url |
| URL.Malicious.Vendor | string | For malicious Url, the vendor that made the decision |
| URL.Metadata | Unknown | Metadata returned from Intezer analysis |
| URL.ExistsInIntezer | Boolean | Does the url exists on intezer |
Command Example#
Context Example#
Human Readable Output#
intezer-get-latest-report#
Checks file reputation of the given hash, supports SHA256, SHA1 and MD5 by looking at the latest available report
Base Command#
intezer-get-latest-report
Input#
| Argument Name | Description | Required |
|---|---|---|
| file_hash | Hash of the file to query. Supports SHA256, MD5 and SHA1. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| File.SHA256 | string | Hash SHA256 |
| File.Malicious.Vendor | string | For malicious files, the vendor that made the decision |
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | number | The actual score |
| File.Metadata | Unknown | Metadata returned from Intezer analysis (analysis id, analysis url, family, family type, sha256, verdict, sub_verdict). Metadata will be returned only for supported files. |
| File.ExistsInIntezer | Boolean | Does the file exists on intezer genome database |
Command Example#
Context Example#
Human Readable Output#
intezer-analyze-by-file#
Checks file reputation for uploaded file (up to 150MB)
Base Command#
intezer-analyze-by-file
Input#
| Argument Name | Description | Required |
|---|---|---|
| file_entry_id | The file entry id to upload. | Required |
| related_alert_ids | An array of alert ids to associate with the file analysis. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | Intezer analysis id |
| Intezer.Analysis.Status | string | status of the analysis |
| Intezer.Analysis.Type | string | type of the analysis |
| File.SHA256 | string | Hash SHA256 |
| File.Malicious.Vendor | string | For malicious files, the vendor that made the decision |
| File.Metadata | Unknown | Metadata returned from Intezer analysis (analysis id, analysis url, family, family type, sha256, verdict, sub_verdict). Metadata will be returned only for supported files. |
| File.ExistsInIntezer | Boolean | Does the file exists on intezer genome database |
Command Example#
Context Example#
Human Readable Output#
intezer-get-endpoint-analysis-result#
Check the endpoint analysis status and get analysis result, supports polling.
Base Command#
intezer-get-endpoint-analysis-result
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get results for. | Required |
| wait_for_result | Waits for analysis result, support polling | Optional |
| interval | Number of seconds between poll requests | Optional |
| timeout | Number of seconds until polling timeout | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | number | The actual score |
| Endpoint.Metadata | Unknown | Metadata returned from Intezer analysis (endpoint analysis id, endpoint analysis url, families, verdict, host_name) |
Command Example#
intezer-get-url-analysis-result#
Check the url analysis status and get analysis result, supports polling.
Base Command#
intezer-get-url-analysis-result
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get results for. | Required |
| wait_for_result | Waits for analysis result, support polling | Optional |
| interval | Number of seconds between poll requests | Optional |
| timeout | Number of seconds until polling timeout | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | number | The actual score |
| URL.Data | string | The submitted Url |
| URL.Malicious.Vendor | string | For malicious Url, the vendor that made the decision |
| URL.Metadata | Unknown | Metadata returned from Intezer analysis |
| URL.ExistsInIntezer | Boolean | Does the url exists on intezer |
Command Example#
intezer-get-file-analysis-result#
Check the file analysis status and get analysis result, supports polling.
Base Command#
intezer-get-file-analysis-result
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get results for. | Required |
| wait_for_result | Waits for analysis result, support polling | Optional |
| interval | Number of seconds between poll requests | Optional |
| timeout | Number of seconds until polling timeout | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | number | The actual score |
| File.SHA256 | string | Hash SHA256 |
| File.SHA1 | string | Hash SHA1 |
| File.MD5 | string | Hash MD5 |
| File.Malicious.Vendor | string | For malicious files, the vendor that made the decision |
| File.Metadata | Unknown | Metadata returned from Intezer analysis (analysis id, analysis url, family, family type, sha256, verdict, sub_verdict). Metadata will be returned only for supported files. |
| File.ExistsInIntezer | Boolean | Does the file exists on intezer genome database |
Command Example#
intezer-get-analysis-result#
Check the analysis status and get analysis result, support file and endpoint analysis
Base Command#
intezer-get-analysis-result
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get results for. | Optional |
| analysis_type | The type of the analysis. Possible values are: File, Endpoint, Url. Default is File. | Optional |
| indicator_name | indicator to classify. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | number | The actual score |
| File.SHA256 | string | Hash SHA256 |
| File.SHA1 | string | Hash SHA1 |
| File.MD5 | string | Hash MD5 |
| File.Malicious.Vendor | string | For malicious files, the vendor that made the decision |
| File.Metadata | Unknown | Metadata returned from Intezer analysis (analysis id, analysis url, family, family type, sha256, verdict, sub_verdict). Metadata will be returned only for supported files. |
| File.ExistsInIntezer | Boolean | Does the file exists on intezer genome database |
| URL.Data | string | The submitted Url |
| Url.URL | string | The submitted Url (deprecated) |
| URL.Malicious.Vendor | string | For malicious Url, the vendor that made the decision |
| Url.Malicious.Vendor | string | For malicious Url, the vendor that made the decision (deprecated) |
| URL.Metadata | Unknown | Metadata returned from Intezer analysis |
| Url.Metadata | Unknown | Metadata returned from Intezer analysis (deprecated) |
| URL.ExistsInIntezer | Boolean | Does the url exists on intezer |
| Url.ExistsInIntezer | Boolean | Does the url exists on intezer (deprecated) |
| Endpoint.Metadata | Unknown | Metadata returned from Intezer analysis (endpoint analysis id, endpoint analysis url, families, verdict, host_name) |
Command Example#
Context Example#
Human Readable Output#
intezer-get-sub-analyses#
Get a list of the analysis sub analyses
Base Command#
intezer-get-sub-analyses
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get the sub analyses for. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | Intezer analysis id |
| Intezer.Analysis.SubAnalysesIDs | Unknown | List of all sub analyses of the give analysis |
Command Example#
Context Example#
Human Readable Output#
intezer-get-family-info#
Get family information from Intezer Analyze
Base Command#
intezer-get-family-info
Input#
| Argument Name | Description | Required |
|---|---|---|
| family_id | The Family ID. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Family.ID | string | Family id in intezer genome database |
| Intezer.Family.Name | string | Family name |
| Intezer.Family.Type | string | Family Type |
Command Example#
Context Example#
Human Readable Output#
intezer-get-analysis-code-reuse#
Get All code reuse report for an analysis or sub analysis To get the code reuse results of a sub analysis you also must specify the "parent analysis",
For example - If you ran the command intezer-get-sub-analyses analysis_id=123
and got the sub analysis 456, you need to specify both in the command
Base Command#
intezer-get-analysis-code-reuse
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID (parent analysis in case we're trying to get sub abalysis) we want to get the code reuse for. | Required |
| sub_analysis_id | The Sub Analysis we want to get the code reuse for. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | The composed analysis ID |
| Intezer.Analysis.CodeReuse | Unknown | General Code Reuse of the analysis |
| Intezer.Analysis.CodeReuseFamilies | Unknown | List of the families appearing in the code reuse |
| Intezer.Analysis.SubAnalyses.CodeReuse | Unknown | General Code Reuse of the analysis |
| Intezer.Analysis.SubAnalyses.CodeReuseFamilies | Unknown | List of the families appearing in the code reuse |
| Intezer.Analysis.SubAnalyses.RootAnalysis | string | The Composed analysis id |
Command Example#
Context Example#
Human Readable Output#
This will show information about the analysis code reuse and families
intezer-get-analysis-metadata#
Get metadata for an analysis or sub analysis To get the metadata of a sub analysis you also must specify the "parent analysis",
For example - If you ran the command intezer-get-sub-analyses analysis_id=123
and got the sub analysis 456, you need to specify both in the command
Base Command#
intezer-get-analysis-metadata
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get the metadata for. | Required |
| sub_analysis_id | The Sub Analysis we want to get the metadata for. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | The composed analysis ID |
| Intezer.Analysis.Metadata | Unknown | The Analysis metadata |
| Intezer.Analysis.SubAnalyses.Metadata | Unknown | The Sub Analysis metadata |
Command Example#
Context Example#
Human Readable Output#
intezer-get-analysis-iocs#
Gets the list of network and files IOCs of a specific analysis id.
Base Command#
intezer-get-analysis-iocs
Input#
| Argument Name | Description | Required |
|---|---|---|
| analysis_id | The analysis ID we want to get the IOCs for. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Analysis.ID | string | The composed analysis ID |
| Intezer.Analysis.IOCs | Dict | The Analysis IOCs |
Context Example#
Human Readable Output#
intezer-submit-alert#
Submit a new alert, including the raw alert information, to Intezer for processing.
Base Command#
intezer-submit-alert
Input#
| Argument Name | Description | Required |
|---|---|---|
| raw_alert | The raw alert as it stored in the context. | Required |
| mapping | The mapping for the raw alert data. | Required |
| source | The source of the alert. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Alert.ID | string | The Alert ID |
| Intezer.Alert.Status | string | The status of the Alert |
Context Example#
intezer-submit-suspected-phishing-email#
Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing.
Base Command#
intezer-submit-suspected-phishing-email
Input#
| Argument Name | Description | Required |
|---|---|---|
| email_file_entry_id | The email file entry id to upload. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Alert.ID | string | The Alert ID |
| Intezer.Alert.Status | string | The status of the Alert |
Context Example#
intezer-get-alert-result#
Get an ingested alert triage and response information using alert ID.
Base Command#
intezer-get-alert-result
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | The alert id to query. | Required |
| wait_for_result | Waits for alert result, support polling. | Optional |
Context Output#
| Path | Type | Description |
|---|---|---|
| Intezer.Alert.ID | string | The Alert ID |
| Intezer.Alert.Status | string | The Alert status |
| Intezer.Alert.Result | Object | The full report of the alert |
| Intezer.Alert.Result.intezer_alert_url | Object | The url for the alert result on Intezer Analyze |
| DBotScore.Indicator | string | The indicator we tested |
| DBotScore.Type | string | The type of the indicator |
| DBotScore.Vendor | string | Vendor used to calculate the score |
| DBotScore.Score | string | The actual score |
| File.SHA256 | string | Hash SHA256 |
| File.SHA1 | string | Hash SHA1 |
| File.MD5 | string | Hash MD5 |
| URL.Data | string | The tested URL |
| URL.Malicious.Vendor | string | For malicious URL, the vendor that made the decision |
| URL.Relationships | object | The relationships between two urls |
| Intezer.Alert.Result.raw_alert | object | The raw alert as submitted to Intezer |
| Intezer.Alert.Result.triage_result.alert_verdict_display | string | The verdict of the alert |
| Intezer.Alert.Result.source_display | string | The calculated verdict of the Alert |
| Intezer.Alert.Result.triage_result.risk_category_display | string | The risk category of the Alert |
| Intezer.Alert.Result.response.user_recommended_actions_display | string | The actions recommended by Intezer to be taken |