Malwation AIMA (Deprecated)
#
This Integration is part of the MalwationAIMA (Deprecated) Pack.Deprecated
Use ThreatZone instead.
Malwation AIMA malware analysis sandboxing.
#
Configure Malwation AIMA on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Malwation AIMA.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL (e.g. https://aima.malwation.com) True AIMA API Key True Trust any certificate (not secure) False Use system proxy settings False CAP API Key It is additional for MALWATION Content Analysis Platform. False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
aima-upload-sampleSubmits a sample to AIMA for analysis.
#
Base Commandaima-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
environment | Choose what environment you want to run your submission. Possible values are: win7x64, win10x64. Default is win7x64. | Required |
isPublic | Privacy of the submission. Possible values are: true, false. Default is false. | Required |
entry_id | Entry ID of the file to submit. Possible values are: . | Required |
timeout | Duration of the submission analysis. Possible values are: 1, 2, 5, 8. Default is 1. | Optional |
mouse_simulation | Enable human simulation. Possible values are: true, false. Default is false. | Optional |
config_extractor | Malware Config Extractor Possible values are: true, false. Default is false. | Optional |
https_inspection | Https inspection to read encrypted traffic. Possible values are: true, false. Default is false. | Optional |
full_memory_dump | If you want to access MemProcFS Module enable this metafield. Possible values are: true, false. Default is false. | Optional |
enable_net | Enable Internet Connection Possible values are: true, false. Default is false. | Optional |
work_path | The working path of the submission. Possible values are: desktop, appdata, windows, temp. Default is desktop. | Optional |
zip_pass | Password of the zip file. Do not use if archive has no password. | Optional |
file_from_zip | Name of the sample in the zip file. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AIMA.Analysis.UUID | String | UUID of sample. |
AIMA.Analysis.URL | String | URL of analysis of sample. |
#
Command Example#
Context Example#
aima-get-resultRetrive the analysis result from AIMA Sandbox.
#
Base Commandaima-get-result
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the submission. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
AIMA.Result.STATUS | String | The status of the submission scanning process. |
AIMA.Result.LEVEL | String | Threat Level of the scanned file. (malicious, suspicious or informative) |
AIMA.Result.URL | String | The result page url of the submission. |
AIMA.Result.MD5 | String | The md5 hash of the submission. |
AIMA.Result.INFO | String | Contains the file name, scan process status and public status. |
AIMA.Result.SHA1 | String | The sha1 hash of the submission. |
AIMA.Result.SHA256 | String | The sha256 hash of the submission. |
AIMA.Result.ID | String | The ID of the submission |
#
Command Example#
Context Example#
aima-cap-static-upload-sampleSubmits sample to Malwation CAP for static analysis.
#
Base Commandaima-cap-static-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | The entry id of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Static.UUID | String | The uuid value of the submission. |
#
Command Example#
Context Example#
aima-cap-mav-upload-sampleSubmits sample to Malwation CAP for mav analysis.
#
Base Commandaima-cap-mav-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | The Entry id of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Mav.UUID | String | The uuid value of the submission. |
#
Command Example#
Context Example#
aima-cap-static-get-submissionRetrive static analysis result from Malwation CAP.
#
Base Commandaima-cap-static-get-submission
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The uuid of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Static.SCORE | String | Thread level of the scanned file. (malicious, suspicious or informative) |
CAP.Static.WEIGHT | Number | The weight score of detection. |
CAP.Static.STATUS | String | The status of the submission scanning process. |
CAP.Static.YARA | String | The matched yara rules with sample. |
CAP.Static.ENTROPY | Number | The entropy value of sample. |
#
Command Example#
Context Example#
aima-cap-mav-get-submissionRetrive mav analysis result from Malwation CAP.
#
Base Commandaima-cap-mav-get-submission
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The uuid value of submission | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Mav.COUNT | Number | The count of the detection by engines. |
CAP.Mav.SCORE | String | Threat Level of the scanned file (malicious, suspicious or informative) |
CAP.Mav.DETECTIONS | Number | The results of detections by engines. |
CAP.Mav.STATUS | String | The status of the submission scanning process. |