Malwation AIMA (Deprecated)
#
This Integration is part of the MalwationAIMA (Deprecated) Pack.Deprecated
Use ThreatZone instead.
Malwation AIMA malware analysis sandboxing.
#
Configure Malwation AIMA in CortexParameter | Description | Required |
---|---|---|
Server URL (e.g. https://aima.malwation.com) | True | |
AIMA API Key | True | |
Trust any certificate (not secure) | False | |
Use system proxy settings | False | |
CAP API Key | It is additional for MALWATION Content Analysis Platform. | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
aima-upload-sampleSubmits a sample to AIMA for analysis.
#
Base Commandaima-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
environment | Choose what environment you want to run your submission. Possible values are: win7x64, win10x64. Default is win7x64. | Required |
isPublic | Privacy of the submission. Possible values are: true, false. Default is false. | Required |
entry_id | Entry ID of the file to submit. Possible values are: . | Required |
timeout | Duration of the submission analysis. Possible values are: 1, 2, 5, 8. Default is 1. | Optional |
mouse_simulation | Enable human simulation. Possible values are: true, false. Default is false. | Optional |
config_extractor | Malware Config Extractor Possible values are: true, false. Default is false. | Optional |
https_inspection | Https inspection to read encrypted traffic. Possible values are: true, false. Default is false. | Optional |
full_memory_dump | If you want to access MemProcFS Module enable this metafield. Possible values are: true, false. Default is false. | Optional |
enable_net | Enable Internet Connection Possible values are: true, false. Default is false. | Optional |
work_path | The working path of the submission. Possible values are: desktop, appdata, windows, temp. Default is desktop. | Optional |
zip_pass | Password of the zip file. Do not use if archive has no password. | Optional |
file_from_zip | Name of the sample in the zip file. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AIMA.Analysis.UUID | String | UUID of sample. |
AIMA.Analysis.URL | String | URL of analysis of sample. |
#
Command Example#
Context Example#
aima-get-resultRetrive the analysis result from AIMA Sandbox.
#
Base Commandaima-get-result
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the submission. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
AIMA.Result.STATUS | String | The status of the submission scanning process. |
AIMA.Result.LEVEL | String | Threat Level of the scanned file. (malicious, suspicious or informative) |
AIMA.Result.URL | String | The result page url of the submission. |
AIMA.Result.MD5 | String | The md5 hash of the submission. |
AIMA.Result.INFO | String | Contains the file name, scan process status and public status. |
AIMA.Result.SHA1 | String | The sha1 hash of the submission. |
AIMA.Result.SHA256 | String | The sha256 hash of the submission. |
AIMA.Result.ID | String | The ID of the submission |
#
Command Example#
Context Example#
aima-cap-static-upload-sampleSubmits sample to Malwation CAP for static analysis.
#
Base Commandaima-cap-static-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | The entry id of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Static.UUID | String | The uuid value of the submission. |
#
Command Example#
Context Example#
aima-cap-mav-upload-sampleSubmits sample to Malwation CAP for mav analysis.
#
Base Commandaima-cap-mav-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | The Entry id of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Mav.UUID | String | The uuid value of the submission. |
#
Command Example#
Context Example#
aima-cap-static-get-submissionRetrive static analysis result from Malwation CAP.
#
Base Commandaima-cap-static-get-submission
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The uuid of the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Static.SCORE | String | Thread level of the scanned file. (malicious, suspicious or informative) |
CAP.Static.WEIGHT | Number | The weight score of detection. |
CAP.Static.STATUS | String | The status of the submission scanning process. |
CAP.Static.YARA | String | The matched yara rules with sample. |
CAP.Static.ENTROPY | Number | The entropy value of sample. |
#
Command Example#
Context Example#
aima-cap-mav-get-submissionRetrive mav analysis result from Malwation CAP.
#
Base Commandaima-cap-mav-get-submission
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The uuid value of submission | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CAP.Mav.COUNT | Number | The count of the detection by engines. |
CAP.Mav.SCORE | String | Threat Level of the scanned file (malicious, suspicious or informative) |
CAP.Mav.DETECTIONS | Number | The results of detections by engines. |
CAP.Mav.STATUS | String | The status of the submission scanning process. |