Cisco Secure Malware Analytics (Threat Grid) v2
Cisco Secure Malware Analytics Pack.#
This Integration is part of theQuery and upload samples to Cisco threat grid. This integration was integrated and tested with version 2 of Cisco Secure Malware Analytics (Threat Grid)
#
Configure Cisco Secure Malware Analytics (Threat Grid) on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Cisco Secure Malware Analytics (Threat Grid).
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL (e.g. https://192.168.0.1) True API token True Source Reliability Reliability of the source providing the intelligence data. True Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
threat-grid-sample-listSearch samples on the Threat Grid platform. Input parameters are ANDed together. Only finished samples can be searched (that is, the ones that are having a status of succ or fail.)
#
Base Commandthreat-grid-sample-list
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | The sample ID. | Optional |
artifact | The artifact to download. Sample ID is required when choosing 'artifact'. Possible values are: video.webm, network-artifacts.zip, report.html, sample.zip, screenshot.png, extracted-artifacts.zip, timeline.json, analysis.json, processes.json, network.pcap. | Optional |
sha1 | A sha1 of the submitted sample, only matches samples, not their artifacts. | Optional |
sha256 | A SHA256 of the submitted sample, only matches samples, not their artifacts. | Optional |
md5 | A MD5 checksum of the submitted sample, only matches samples, not their artifacts. | Optional |
user_only | It 'True' - Only display samples created by the current user, as determined by the value of api_key. | Optional |
org_only | It 'True' - Only display samples created by the current user's organization, as determined by the value of api_key. | Optional |
page | Page number of paginated results. Minimum value: 1. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Sample.id | String | The sample id |
ThreatGrid.Sample.filename | String | The sample filename |
ThreatGrid.Sample.state | String | The state of the sample, one of a stable set of strings "wait, prep, run, proc, succ, fail" |
ThreatGrid.Sample.status | String | The sample status, one of a stable set of strings "succ, fail" |
ThreatGrid.Sample.md5 | String | The sample md5 |
ThreatGrid.Sample.sha1 | String | The sample sha1 |
ThreatGrid.Sample.sha256 | String | The sample sha256 |
ThreatGrid.Sample.os | String | The sample os |
ThreatGrid.Sample.submitted_at | String | The sample submission time |
ThreatGrid.Sample.started_at | String | The sample analysis starting time |
ThreatGrid.Sample.completed_at | String | The sample completion time |
InfoFile.Name | String | The file name |
InfoFile.EntryID | String | The ID for locating the file in the War Room |
InfoFile.Size | String | The size of the file (in bytes) |
InfoFile.Type | String | The file type, as determined by libmagic (same as displayed in file entries) |
InfoFile.Extension | String | The file extension |
InfoFile.Info | String | Basic information about the file |
#
Command example!threat-grid-sample-list
#
Context Example#
Human Readable Output#
Sample details:
Completed At Filename Id Md5 Os Sha1 Sha256 Started At State Status Submission Id Submitted At Tags Vm 2022-12-05T04:17:00Z md5 id md5 os sha1 sha256 2022-12-05T04:10:44Z succ job_done 1538519424 2022-12-05T04:10:44Z win7-x64 2022-11-24T01:04:39Z sha256 id md5 os sha1 sha256 2022-11-24T00:58:22Z succ job_done 1531508494 2022-11-24T00:58:22Z s,
talos,
gravitywin7-x64
#
threat-grid-sample-uploadSubmits a sample to threat grid for analysis. URL or file, not both.
#
Base Commandthreat-grid-sample-upload
#
InputArgument Name | Description | Required |
---|---|---|
file_id | The file ID. Click on the chain-like icon after you upload a file in d__ to find the file_id. | Optional |
url | The URL to upload. . | Optional |
interval_in_seconds | Indicates how long to wait between command execution (in seconds) when 'polling' argument is true. Minimum value is 10 seconds. Default is 10. Default is 10. | Optional |
timeout_in_seconds | Indicates the time in seconds until the polling sequence timeouts. Default is 60. Default is 60. | Optional |
sample_id | The uploaded sample ID. | Optional |
private | Whether to mark the sample as private. | Optional |
hide_polling_output | Whether to hide the polling result (automatically filled by polling). | Optional |
vm | a string identifying a specific VM to use. Options: win7-x64: Windows 7 64bit, win7-x64-2: Windows 7 64-bit Profile 2, win10-x64-2-beta: Windows 10 LTSC 2019 (beta), win10-x64-browser: Windows 10 Browser, win10-x64-jp: Windows 10 Japanese, win10-x64-kr: Windows 10 Korean, win10-x64-phishing-beta: Windows 10 (Phishing), win10: Windows 10 (Not available on Threat Grid appliances). NOTE: The standard (English) VMs default to UTF-8 encoding. To support Korean and Japanese character sets, such as S-JIS, submit to the appropriate VM. | Optional |
playbook | Name of a playbook to apply to this sample run. none: Explicitly disables playbooks, default: Default Playbook, alt_tab_programs: Conduct Active Window Change, open_word_embedded_object: Open Embedded Object in Word Document, use_best_option: allows Malware Analytics to select the best Playbook option based on the submitted sample, visit_site: Visit Website Using Internet Explorer, close_file: Close Active Window. The current list of playbooks endpoints can be obtained by querying /api/v3/configuration/playbooks. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Sample.id | String | The sample id |
ThreatGrid.Sample.filename | String | The sample filename |
ThreatGrid.Sample.state | String | The state of the sample, one of a stable set of strings "wait, prep, run, proc, succ, fail" |
ThreatGrid.Sample.status | String | The sample status |
ThreatGrid.Sample.md5 | String | The sample md5 |
ThreatGrid.Sample.sha1 | String | The sample sha1 |
ThreatGrid.Sample.sha256 | String | The sample sha256 |
ThreatGrid.Sample.os | String | The sample os |
ThreatGrid.Sample.submitted_at | String | The sample submission time |
#
Command example!threat-grid-sample-upload url=http://domain_example:80/ private=True
#
Human Readable OutputUpload sample is executing
#
threat-grid-submissions-searchSearch threat grid submissions
#
Base Commandthreat-grid-submissions-search
#
InputArgument Name | Description | Required |
---|---|---|
query | Query text. If you wish to work with an elasticsearch query please set 'advanced' argument to true. | Optional |
user_only | Only display submissions created by the current user, as determined by the value of api_key. Possible values are: True, False. | Optional |
org_only | Only display submissions created by the current user's organization, as determined by the value of api_key. Possible values are: True, False. | Optional |
term | Restrict matches to a subset of submission fields. The value of 'term' is a comma-delimited list of strings which select groups of fields. Possible values are: antivirus, analysis.artifacts.av_signatures.product, analysis.artifacts.av_signatures.signature, behavior, analysis.behaviors.name, analysis.behaviors.title, analysis.artifacts.av_signatures.signature, domain, analysis.domains.domain, analysis.domains.domain.component, mutant, analysis.processes.mutants, analysis.processes.mutants.whole, analysis.processes.mutants.component, path, filename, analysis.paths.path, analysis.paths.path.whole, analysis.processes.paths, process, analysis.processes.process_name, analysis.processes.startup_info.command_line, analysis.processes.startup_info.image_pathname, analysis.processes.startup_info.window_title, registry_key, analysis.registry_keys.key, analysis.registry_keys.key.whole, analysis.registry_keys.key.component, analysis.processes.registry_keys, analysis.processes.registry_keys.whole, analysis.registry_keys.value_names, sample, filename, url, analysis.urls.url, analysis.urls.url.whole.. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
state | Restrict match to submissions in specific state or states. Possible values are: wait, prep, run, proc, succ, fail. | Optional |
sort_by | If not specified, results will be sorted by the search score, which is based on which fields match the query most accurately, and their weight. Possible values are: timestamp, submitted_at, analyzed_at, filename, type, state, threat or threat_score, login. | Optional |
sort_order | desc or asc. Possible values are: desc, asc. | Optional |
highlight | Provide a 'matches' field in results, indicating which fields were matched. Possible values are: True, False. | Optional |
page | Page number of paginated results. Minimum value: 1. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Sample.sample | String | The sample ID |
ThreatGrid.Sample.filename | String | The name of the sample file |
ThreatGrid.Sample.state | String | The state of the sample, one of a stable set of strings "wait, prep, run, proc, succ, fail" |
ThreatGrid.Sample.status | String | The status of the sample |
ThreatGrid.Sample.md5 | String | The MD5 id of the sample |
ThreatGrid.Sample.sha1 | String | The SHA1 id of the sample |
ThreatGrid.Sample.sha256 | String | The SHA256 id of the sample |
ThreatGrid.Sample.submitted_at | Date | Time of submission for the sample |
ThreatGrid.Sample.threat_score | Number | The threat score of the sample |
#
Command example!threat-grid-submissions-search
#
Context Example#
Human Readable Output#
Samples Submissed :Showing page 1. Current page size: 50 |Filename|Md5|Private|Sample|Sha1|Sha256|State|Status|Submitted At| |---|---|---|---|---|---|---|---|---| | md5 | md5 | false | sample | sha1 | sha256 | wait | pending | 2022-12-22T08:40:47Z | | md5 | md5 | false | sample | sha1 | sha256 | wait | pending | 2022-12-22T08:40:47Z |
#
threat-grid-sample-summary-getReturns summary analysis information
#
Base Commandthreat-grid-sample-summary-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | The sample id. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.SampleAnalysisSummary.sample | String | The sample ID. |
ThreatGrid.SampleAnalysisSummary.registry_count | Number | The registry count of the sample. |
ThreatGrid.SampleAnalysisSummary.filename | String | The Filename of the sample. |
ThreatGrid.SampleAnalysisSummary.sha256 | String | The SHA256 hash of the sample. |
ThreatGrid.SampleAnalysisSummary.magic_type | String | The sample type. |
ThreatGrid.SampleAnalysisSummary.first_seen | Date | The timestamp when the sample was first seen. |
ThreatGrid.SampleAnalysisSummary.last_seen | Date | The timestamp when the sample was last seen. |
#
Command example!threat-grid-sample-summary-get sample_id=sample_id
#
Context Example#
Human Readable Output#
Sample summary:
Artifacts Filename First Seen Iocs Last Seen Magic Type Md5 Registry Count Run Start Run Stop Run Type Sample Sha1 Sha256 Stream Count Tags Times Seen disk: 6
memory: 9
network: 1www.domainexample.url 2021-12-29T15:43:00Z {'category': ['static-anomaly'], 'confidence': 100, 'ioc': 'html-small-file-redirect', 'severity': 50, 'tags': ['html', 'redirect'], 'score': 50},
{'category': ['network-information'], 'confidence': 50, 'ioc': 'http-response-redirect', 'severity': 50, 'tags': ['network', 'http', 'redirect'], 'score': 25},
{'category': ['domain'], 'confidence': 95, 'ioc': 'network-only-safe-domains-contacted', 'severity': 20, 'tags': ['umbrella', 'dns'], 'score': 19},
{'category': ['network-information'], 'confidence': 25, 'ioc': 'network-communications-http-get-url', 'severity': 25, 'tags': ['network', 'http', 'get'], 'score': 6}2022-12-21T12:09:33Z MS Windows 95 Internet shortcut text (URL=<http://www.domain_example>), ASCII text md5 143 2022-12-21T12:09:33Z 2022-12-21T12:16:27Z url sample_id sha1 sha256 44 85
#
threat-grid-who-am-iGet logged in user
#
Base Commandthreat-grid-who-am-i
#
InputThere are no input arguments for this command.
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.User.email | string | Current user mail. |
ThreatGrid.User.login | string | Current user login name. |
#
Command example!threat-grid-who-am-i
#
Context Example#
Human Readable Output#
Who am I ?
Active Api Key Api Only Device Integration Id Login Name Organization Id Role Title true key false false z1ci login_name name id org-admin
#
threat-grid-rate-limit-getGet rate limit for a specific user name. ThreatGrid employs a simple rate limiting method for sample submissions by specifying the number of samples which can be submitted within some variable time period by a user. Multiple rate limits can be employed to form overlapping submission limits. For example, 20 submissions per hour AND 400 per day.
#
Base Commandthreat-grid-rate-limit-get
#
InputArgument Name | Description | Required |
---|---|---|
login | User login name. | Required |
entity_type | User or Organization. Possible values are: user, organization. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.RateLimit.submission-rate-limit | number | Array of array(s) representing submission(s) per minute(s) or the string"nil" to clear the value. Example: [[5, 1440]] which represents 5 samples per day. This field represent the number of samples allowed. |
ThreatGrid.RateLimit.submission-wait-seconds | number | The number of seconds to wait for a submission to get uploaded on the platform. |
ThreatGrid.RateLimit.submissions-available | number | The number of submissions available for the specified username |
#
Command example!threat-grid-rate-limit-get login=login_name entity_type=user
#
Context Example#
Human Readable Output#
user rate limit :
Submission-rate-limit Submission-wait-seconds Submissions-available 0
#
threat-grid-feed-specific-getGets a specific threat feed
#
Base Commandthreat-grid-feed-specific-get
#
InputArgument Name | Description | Required |
---|---|---|
feed_name | The feed name. Possible values are: autorun-registry, banking-dns, dga-dns, dll-hijacking-dns, doc-net-com-dns, downloaded-pe-dns, dynamic-dns, irc-dns, modified-hosts-dns, parked-dns, public-ip-check-dns, ransomware-dns, rat-dns, scheduled-tasks, sinkholed-ip-dns, stolen-cert-dns. | Required |
output_type | The output type. Possible values are: json, csv, stix, snort, txt. Default is json. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Feed.sample | String | Feed sample. |
ThreatGrid.Feed.description | String | Feed description. |
#
Command example!threat-grid-feed-specific-get feed_name=doc-net-com-dns
#
Context Example#
Human Readable Output#
Specific feed :
Sample Description https://panacea.threatgrid.com/feeds/doc-net-com-dns/samples/4007c79d4db4af076e67a32b9aa9eae8 DNS response information from requests made by document samples performing network communications. https://panacea.threatgrid.com/feeds/doc-net-com-dns/samples/9df95de1e738730ea3eb9c2ec122afa7 DNS response information from requests made by document samples performing network communications.
#
threat-grid-ip-searchSearch IPs. Please provide a single argument (only one) to use this command, as the API supports 1 filter at a time.
#
Base Commandthreat-grid-ip-search
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP to search for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.search.ip | string | IP item. |
ThreatGrid.search.asn | string | IP asn. |
ThreatGrid.search.location | string | IP location details. |
#
Command example!threat-grid-ip-search ip=8.8.8.8
#
Context Example#
Human Readable Output#
ip data:
Asn Flags Ip Location Rev Tags org: Google
asn: 15169{'created_at': '2013-11-15T18:16:33Z', 'expiration': '2025-01-01T00:00:00Z', 'flag': 1, 'login': 'admin', 'reason': 'Content Delivery Network', 'mine': False},
{'created_at': '2013-11-15T18:16:34Z', 'expiration': '2025-01-01T00:00:00Z', 'flag': 1, 'login': 'admin', 'reason': 'resolves to google-public-dns-a.domain_example', 'mine': False},
{'created_at': '2013-07-25T14:08:34Z', 'expiration': '2025-01-01T00:00:00Z', 'flag': 1, 'login': 'dean', 'reason': 'Whitelisted', 'mine': False}8.8.8.8 country: US
region: CA
city: Los Angelesdns.google
#
threat-grid-analysis-annotations-getReturns data regarding the annotations of the analysis
#
Base Commandthreat-grid-analysis-annotations-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | The sample ID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.SampleAnnotations.network | String | IP address & timestamp in the annotation. |
#
Command example!threat-grid-analysis-annotations-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
ip1 ip2 ts: 2022-12-21T12:15:59Z org: Google
ts: 2022-12-21T12:15:59Z
country: US
city: c
region_name: New York
region: NY
reverse_dns: lga34s32-in-f3.1e100.net
country_name: United States
asn: 15169
#
threat-grid-url-searchSearch urls. Please provide the URL in the format http://example.com:80/ (note that ThreatGrid only support '.com' domains).
#
Base Commandthreat-grid-url-search
#
InputArgument Name | Description | Required |
---|---|---|
url | The URL to search for (please provide the URL in the format http://example.com:80/. note that ThreatGrid only support '.com' domains). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.search.url | String | URL item |
#
Command example!threat-grid-url-search url=http://domain_example:80/
#
Context Example#
Human Readable Output#
url data:
Host Path Port Protocol Query Query-params Reference Url domain_example / 80 http http://domain_example:80/
#
threat-grid-feeds-artifactGet artifacts threat feed
#
Base Commandthreat-grid-feeds-artifact
#
InputArgument Name | Description | Required |
---|---|---|
sha256 | Restrict returned records with this sha256. | Optional |
sha1 | Restrict returned records with this sha1. | Optional |
md5 | Restrict returned records with this md5. | Optional |
path | Restrict returned records to this path or path fragment. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_size | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Artifact.confidence | Number | Artifact confidence |
ThreatGrid.Artifact.severity | Number | Artifact severity |
ThreatGrid.Artifact.ioc | String | Artifact IOC |
ThreatGrid.Artifact.artifact_sha256 | String | Artifact sha256 |
ThreatGrid.Artifact.artifact_md5 | String | Artifact md5 |
ThreatGrid.Artifact.sample_id | String | Artifact sample ID |
#
Command example!threat-grid-feeds-artifact
#
Context Example#
Human Readable Output#
Feeds IOCs list artifact :Showing page 1. Current page size: 50 |Aid|Artifact Md5|Artifact Sha256|Confidence|Ioc|Path|Sample Id|Severity|Timestamp| |---|---|---|---|---|---|---|---|---| | 3 | md5 | sha256 | 90 | antivirus-flagged-artifact | \Users\Administrator.exe | id | 80 | 2022-12-05T04:10:44Z | | 9 | md5 | sha256 | 90 | antivirus-flagged-artifact | 912-.exe | id | 80 | 2022-12-05T04:10:44Z |
#
threat-grid-feeds-domainGet domain threat feed
#
Base Commandthreat-grid-feeds-domain
#
InputArgument Name | Description | Required |
---|---|---|
domain | Restrict returned records to this domain or hostname. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Domain.confidence | Number | Domain confidence |
ThreatGrid.Domain.severity | Number | Domain severity |
ThreatGrid.Domain.ioc | String | Domain IOC |
ThreatGrid.Domain.sample_sha256 | String | Domain sha256 |
ThreatGrid.Domain.sample_id | String | Domain sample ID |
ThreatGrid.Domain.domain | String | The Domain |
#
Command example!threat-grid-feeds-domain
#
Context Example#
Human Readable Output#
Feeds IOCs list domain :Showing page 1. Current page size: 50 |Confidence|Domain|Ioc|Sample Id|Sample Sha256|Severity|Timestamp| |---|---|---|---|---|---|---| | 95 | hookworm.capitaly.ru | network-snort-pua | sample_id | sample_sha256 | 90 | 2022-12-22T07:46:38Z | | 100 | augustawa.com | suspicious-user-agent | sample_id | sample_sha256 | 80 | 2022-11-28T23:51:27Z |
#
threat-grid-feeds-urlGet url threat feed
#
Base Commandthreat-grid-feeds-url
#
InputArgument Name | Description | Required |
---|---|---|
url | Restrict returned records to this url. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Url.confidence | Number | url confidence |
ThreatGrid.Url.severity | Number | url severity |
ThreatGrid.Url.ioc | String | url IOC |
ThreatGrid.Url.sample_sha256 | String | url sha256 |
ThreatGrid.Url.sample_id | String | url sample ID |
ThreatGrid.Url.url | String | The url |
#
Command example!threat-grid-feeds-url
#
Context Example#
Human Readable Output#
Feeds IOCs list url :Showing page 1. Current page size: 50 |Confidence|url|Ioc|Sample Id|Sample Sha256|Severity|Timestamp| |---|---|---|---|---|---|---| | 95 | hookworm.capitaly.ru | network-snort-pua | sample_id | sample_sha256 | 90 | 2022-12-22T07:46:38Z | | 100 | augustawa.com | suspicious-user-agent | sample_id | sample_sha256 | 80 | 2022-11-28T23:51:27Z |
#
threat-grid-feeds-ipGet ips threat feed
#
Base Commandthreat-grid-feeds-ip
#
InputArgument Name | Description | Required |
---|---|---|
ip | Restrict returned records to this IP or CIDR block. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Ip.confidence | Number | IP confidence |
ThreatGrid.Ip.severity | Number | IP severity |
ThreatGrid.Ip.ioc | String | IP IOC |
ThreatGrid.Ip.sample_sha256 | String | IP sha256 |
ThreatGrid.Ip.sample_id | String | IP sample ID |
ThreatGrid.Ip.ip | String | The IP |
ThreatGrid.Ip.port | Number | The IP port |
#
Command example!threat-grid-feeds-ip
#
Context Example#
Human Readable Output#
Feeds IOCs list ip :Showing page 1. Current page size: 50 |Confidence|Ioc|Ip|Port|Sample Id|Sample Sha256|Severity|Timestamp| |---|---|---|---|---|---|---|---| | 95 | network-snort-pua | ip | | sample_id | sample_sha256 | 90 | 2022-12-22T07:46:38Z | | 90 | network-snort-indicator-compromise | 192.168.1.1 | | sample_id | sample_sha256 | 95 | 2022-12-09T14:22:54Z |
#
threat-grid-feeds-network-streamGet network stream threat feed
#
Base Commandthreat-grid-feeds-network-stream
#
InputArgument Name | Description | Required |
---|---|---|
ip | Restrict returned records to this IP address. | Optional |
port | Restrict returned records to this port number. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.NetworkStreams.confidence | Number | Network Streams confidence |
ThreatGrid.NetworkStreams.severity | Number | Network Streams severity |
ThreatGrid.NetworkStreams.ioc | String | Network Streams IOC |
ThreatGrid.NetworkStreams.sample_sha256 | String | Network Streams sha256 |
ThreatGrid.NetworkStreams.sample_id | String | Network Streams sample ID |
ThreatGrid.NetworkStreams.src | String | The Network Streams source |
ThreatGrid.NetworkStreams.src_port | Number | The Network Streams source port |
ThreatGrid.NetworkStreams.dst | String | The Network Streams destination |
ThreatGrid.NetworkStreams.dst_port | Number | The Network Streams destination port |
#
Command example!threat-grid-feeds-network-stream
#
Context Example#
Human Readable Output#
Feeds IOCs list network_stream :Showing page 1. Current page size: 50 |Confidence|Dst|Dst Port|Ioc|Sample Id|Sample Sha256|Severity|Src|Src Port|Timestamp| |---|---|---|---|---|---|---|---|---|---| | 95 | ip | 80 | network-snort-pua | sample_id | sample_sha256 | 90 | ip | 49164 | 2022-12-22T07:46:38Z | | 95 | ip | 80 | network-snort-pua | sample_id | sample_sha256 | 90 | ip | 49158 | 2022-12-22T07:46:38Z |
#
threat-grid-feeds-pathGet path threat feed
#
Base Commandthreat-grid-feeds-path
#
InputArgument Name | Description | Required |
---|---|---|
path | Restrict returned records to this path or path fragment. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Path.confidence | Number | Path confidence |
ThreatGrid.Path.severity | Number | Path severity |
ThreatGrid.Path.ioc | String | Path IOC |
ThreatGrid.Path.sample_sha256 | String | Path sha256 |
ThreatGrid.Path.sample_id | String | Path sample ID |
#
Command example!threat-grid-feeds-path
#
Context Example#
Human Readable Output#
Feeds IOCs list path :Showing page 1. Current page size: 50 |Confidence|Ioc|Path|Sample Id|Sample Sha256|Severity|Timestamp| |---|---|---|---|---|---|---| | 90 | antivirus-flagged-artifact | \Users\Administrator.exe | id | sha256 | 80 | 2022-12-05T04:10:44Z | | 90 | antivirus-flagged-artifact | 912-.exe | id | sha256 | 80 | 2022-12-05T04:10:44Z |
#
threat-grid-feeds-urlGet url threat feed
#
Base Commandthreat-grid-feeds-url
#
InputArgument Name | Description | Required |
---|---|---|
url | Restrict returned records to this URL or URL fragment. | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
confidence | Restrict to IOCs with this confidence score or higher, defaults to 80. Default is 80. | Optional |
severity | Restrict to IOCs with this severity score or higher, defaults to 80. Default is 80. | Optional |
ioc | Restrict returned records to events of this type. | Optional |
org_only | If “true”, will only match against samples submitted by your organization. Possible values are: True, False. | Optional |
user_only | If “true”, will only match against samples you submitted. Possible values are: True, False. | Optional |
sample_id | A comma-separated list of sample IDs. Restrict results to these samples. | Optional |
page | Page number of paginated results. | Optional |
page_size | The number of items per page. | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.Url.confidence | Number | URL confidence |
ThreatGrid.Url.severity | Number | URL severity |
ThreatGrid.Url.ioc | String | URL IOC |
ThreatGrid.Url.sample_sha256 | String | URL sha256 |
ThreatGrid.Url.sample_id | String | URL sample ID |
ThreatGrid.Url.url | String | The URL |
#
threat-grid-analysis-artifacts-getReturns the sample id artifact with artifact id
#
Base Commandthreat-grid-analysis-artifacts-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | the sample id. | Required |
artifact_id | The artifact id requested. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.ArtifactAnalysis.items | Unknown | Analysis files of the sample and the artifact |
#
Command example!threat-grid-analysis-artifacts-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
1 10 origin: submitted
executedfrom:
path: www.domain_example.url
mime-type: text/plain; charset=us-ascii
whitelist:
created-time: 0
read_by:
created_by:
sha256: sha256
sha1: sha1
md5: md5
entropy: x
type: url
size: 45
modified_by:
magic-type: MS Windows 95 Internet shortcut text (URL=<http://www.domain_example>), ASCII text
relation: {"contains": null, "extracted_from": null, "network": null, "process": null}origin: disk
executed_from:
path: path
mime-type: application/octet-stream; charset=binary
whitelist:
created-time: 1671624958
read_by:
created_by: 24
sha256: sha256
sha1: sha1
md5: md5
entropy: 0
type:
size: 276959
modified_by:
magic-type: data
relation: {"contains": null, "extracted_from": null, "network": null, "process": null}
#
threat-grid-analysis-iocs-getReturns data regarding the specified Indicator of Compromise
#
Base Commandthreat-grid-analysis-iocs-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | the sample id. | Required |
ioc | the IOC requested. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.IOCAnalysis.title | String | The title of the IOC |
ThreatGrid.IOCAnalysis.confidence | Number | The confidence of the IOC |
ThreatGrid.IOCAnalysis.severity | String | The severity of the IOC |
ThreatGrid.IOCAnalysis.ioc | String | Threat grid's IOC |
ThreatGrid.IOCAnalysis.category | String | The IOC category of the IOC |
ThreatGrid.IOCAnalysis.sha256 | String | The SHA256 value of the IOC |
ThreatGrid.IOCAnalysis.tags | String | The tags of the IOC |
#
Command example!threat-grid-analysis-iocs-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
Analysis-envs Category Confidence Data Description Heuristic Coefficient Hits Ioc Mitre Mitre-tactics Mitre-techniques Orbital-queries Severity Suspected-sample-categories Tags Title Truncated win,
macnetwork-information 50 {'Code': 302, 'Method': 'GET', 'Network_Stream': 11, 'Status': 'Found', 'Trans_ID': 0, 'URL': 'http://www.domain_example:80/'} An HTTP message indicating a redirection notice was detected in a network stream. The HTTP response codes are used as a means of conveying the status of the connection with the server to the client. Items within the 300 range indicate a redirection notice. These occur when a page has been temporarily or permanently moved. -0.0987738978328 1 http-response-redirect 50 network,
http,
redirectHTTP Redirection Response false win,
mac,
browsernetwork-information 25 {'Method': 'GET', 'Network_Stream': 11, 'URL': 'http://www.domain_example:80/'} Outbound HTTP GET to a remote server was detected. This is not inherently suspicious but malware will often use Gets in order to check in to the Command and Control servers upon infection or to download or exfiltrate data. Please view the 'HTTP' section under 'Network Analysis' for the associated traffic/communications. Additionally, the provided network PCAP will provide more details on the traffic stream. -26.131188198 1 network-communications-http-get-url {'tactic': 'command and control', 'techniques': [{'subtechniques': [], 'technique': 'application layer protocol'}]} command and control application layer protocol 25 network,
http,
getOutbound HTTP GET Request From URL Submission false
#
threat-grid-analysis-metadata-getReturns metadata about the analysis
#
Base Commandthreat-grid-analysis-metadata-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | the sample id. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.AnalysisMetadata.general_details | Unknown | The Metadata Analysis General Details |
ThreatGrid.AnalysisMetadata.malware_desc | Unknown | The Metadata Analysis Malware Desc |
ThreatGrid.AnalysisMetadata.sandcastle_env | Unknown | The Metadata Analysis Malware Sandcastle ENV |
#
Command example!threat-grid-analysis-metadata-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
Filename Magic Md5 Sha1 Sha256 Size Type www.domainexample.url MS Windows 95 Internet shortcut text (URL=<http://www.domain_example>), ASCII text md5 sha1 sha256 45 url
#
threat-grid-analysis-network-streams-getReturns data regarding a specific network stream
#
Base Commandthreat-grid-analysis-network-streams-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | the sample id. | Required |
network_stream_id | The network stream id. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.NetworkAnalysis.protocol | Number | The network protocol |
ThreatGrid.NetworkAnalysis.transport | String | The network transport |
ThreatGrid.NetworkAnalysis.service | String | The network service |
ThreatGrid.NetworkAnalysis.client_ip | String | The client IP |
ThreatGrid.NetworkAnalysis.server_ip | String | The server IP |
#
Command example!threat-grid-analysis-network-streams-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
0 1 transport: UDP
dst: dst
uid: d
bytes_missed: 0
src: ip1
ts_end: 1671624615.899945
dst_port: 67
packets_orig: 2
bytes_orig_payload: 601
bytes: 657
bytes_orig: 657
duration: 0.000993
history: D
bytes_resp_payload: 0
conn_state: S0
service: dhcp
session: 0
bytes_resp: 0
ts_begin: 1671624615.898952
packets: 2
src_port: 68
bytes_payload: 601decoded: {'client_ip': '192.168.1.28', 'client_mac': '00:15:17:22:da:4d', 'dns_servers': ['192.168.1.1'], 'lease_time': 1200, 'netmask': '255.255.255.0', 'routers': ['192.168.1.1'], 'server_ip': '192.168.1.1', 'type': 'DHCP_ACK'}
transport: UDP
protocol: DHCP
dst: 192.168.1.1
uid: CnmnL8FPcbmixXLv1
bytes_missed: 0
src: 192.168.1.28
packets_resp: 2
ts_end: 1671624615.900353
dst_port: 67
bytes_orig_payload: 0
bytes: 664
bytes_orig: 0
duration: 0.000839
history: ^d
bytes_resp_payload: 608
conn_state: SHR
service: dhcp
session: 1
bytes_resp: 664
ts_begin: 1671624615.899514
packets: 2
src_port: 68
bytes_payload: 608
#
threat-grid-analysis-processes-getReturns data regarding the specific process id in the analysis
#
Base Commandthreat-grid-analysis-processes-get
#
InputArgument Name | Description | Required |
---|---|---|
sample_id | the sample id. | Required |
process_id | the process id requested. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.ProcessAnalysis.process_name | String | The process name |
ThreatGrid.ProcessAnalysis.process_id | String | The process ID |
#
Command example!threat-grid-analysis-processes-get sample_id=sample_id
#
Context Example#
Human Readable Output#
List of samples analysis:
1 12 threads: {'client_id': "id", 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': "id", 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 39480025973576, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'}
atoms_added: ImmersiveContextMenuArray_159288160-13,
ImmersiveContextMenuArray_159288160-14,
ImmersiveContextMenuArray_159288448-11,
ImmersiveContextMenuArray_159288448-13,
ImmersiveContextMenuArray_159288448-14,
ImmersiveContextMenuArray_159288448-17,
ImmersiveContextMenuArray_159288736-10,
ImmersiveContextMenuArray_159288736-12,
ImmersiveContextMenuArray_159288736-13,
ImmersiveContextMenuArray_159288736-17,
ImmersiveContextMenuArray_159288832-12,
ImmersiveContextMenuArray_159288832-14,
ImmersiveContextMenuArray_159288832-16,
ImmersiveContextMenuArray_159288832-17,
ImmersiveContextMenuArray_159289024-11,
ImmersiveContextMenuArray_159289024-12,
ImmersiveContextMenuArray_159289600-18,
ImmersiveContextMenuArray_159289696-17,
ImmersiveContextMenuArray_159289696-18,
ImmersiveContextMenuArray_159289888-16,
ImmersiveContextMenuArray_159289888-18,
ImmersiveContextMenuArray_159289984-15,
ImmersiveContextMenuArray_4294967295,
ImmersiveContextMenuArray_60889232-10,
ImmersiveContextMenuArray_60889232-8,
ImmersiveContextMenuArray_60889232-9,
ImmersiveContextMenuArray_60890192-11,
ImmersiveContextMenuArray_60890192-7,
ImmersiveContextMenuArray_60890192-8,
ImmersiveContextMenuArray_60890192-9,
ImmersiveContextMenuArray_60891440-11,
ImmersiveContextMenuArray_60891440-12,
ImmersiveContextMenuArray_60891440-7,
ImmersiveContextMenuArray_60891440-9,
ImmersiveContextMenuArray_60891728-10,
ImmersiveContextMenuArray_60891728-6,
ImmersiveContextMenuArray_60891728-9,
ImmersiveContextMenuArray_60891824-5,
ImmersiveContextMenuArray_60891824-6,
ImmersiveContextMenuArray_60891824-7,
ImmersiveContextMenuArray_60891824-8,
ImmersiveContextMenuArray_60891920-4,
ImmersiveContextMenuArray_60891920-5,
ImmersiveContextMenuArray_60891920-6,
ImmersiveContextMenuArray_60891920-7,
ImmersiveContextMenuArray_61294096-3,
ImmersiveContextMenuArray_61294096-4,
ImmersiveContextMenuArray_61294096-6,
ImmersiveContextMenuArray_61295440-2,
ImmersiveContextMenuArray_61295440-3,
ImmersiveContextMenuArray_61295440-5,
ImmersiveContextMenuArray_61295824-131233,
ImmersiveContextMenuArray_61295824-2,
ImmersiveContextMenuArray_61295824-4,
ImmersiveContextMenuArray_61295824-5,
ImmersiveContextMenuArray_61441088-1,
ImmersiveContextMenuArray_61441088-4001,
ImmersiveContextMenuArray_61441280-4002,
ImmersiveContextMenuArray_61441568-2,
ImmersiveContextMenuArray_61441856-4003,
ImmersiveContextMenuArray_61441952-131233,
ImmersiveContextMenuArray_61442144-4001,
ImmersiveContextMenuArray_61442432-4002,
ImmersiveContextMenuArray_61442528-4000,
ImmersiveContextMenuArray_61442624-4000,
ImmersiveContextMenuArray_61442720-1,
ImmersiveContextMenuArray_61443008-1,
ImmersiveContextMenuArray_61443008-4002,
ImmersiveContextMenuArray_61443296-131233,
ImmersiveContextMenuArray_61443296-4001,
ImmersiveContextMenuArray_61443776-4000,
ImmersiveContextMenuArray_61443968-1,
ImmersiveContextMenuArray_61443968-4003,
ImmersiveContextMenuArray_61444064-4002,
ImmersiveContextMenuArray_61444160-4001,
ImmersiveContextMenuArray_61444256-3,
ImmersiveContextMenuArray_61444256-4000,
ImmersiveContextMenuArray_61444448-2,
ImmersiveContextMenuArray_61444736-131233,
ImmersiveContextMenuArray_61444832-4003,
TrayRaisedWindowProp,
uia
analyzed_because: Process activity after target sample started.
registry_keys_created: {'access': ['CREATE_SUB_KEY', 'READ_CONTROL', 'SET_VALUE'], 'name': 'REGISTRY\USER\S-1-5-21-3467368655-986044752-3166994390-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:000000000006013C', 'options': ['REG_OPTION_VOLATILE']}
monitored: true
parent:
new: false
mutants_created: Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_1280.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_16.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_1920.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_256.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_2560.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_32.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_48.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_768.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_96.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_custom_stream.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_exif.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!IconCacheInit,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!rwReaderRefs,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!rwWriterMutex,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_sr.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_wide.db!dfMaintainer,
Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:iconcache_wide_alternate.db!dfMaintainer
pid: 1692
kpid: uid
ppid: 61
time: Wed, 21 Dec 2022 12:10:16 UTC
registry_keys_deleted: REGISTRY\USER\S-1-5-21-3467368655-986044752-3166994390-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:00000000000A0232,
REGISTRY\USER\S-1-5-21-3467368655-986044752-3166994390-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:0000000000100036,
REGISTRY\USER\S-1-5-21-3467368655-986044752-3166994390-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\HOMEGROUP\UISTATUSCACHE
proc: false
process_name: Explorer.EXE
registry_keys_modified: {'data': 'EAAAADAwRFb0BwKtsB1qQ5DP0vmf3UYC', 'data_type': 'BINARY', 'name': 'REGISTRY\USER\S-1-5-21-3467368655-986044752-3166994390-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:000000000006013C', 'value_name': 'VirtualDesktop'}files_checked: \Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma,
\Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma
files_deleted: \Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma,
\Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3e02b2be.TMP
threads: {'client_id': 6004801706494351000, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 0, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 18375121096688828000, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 18375121096688828000, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 6071227511780497000, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'},
{'client_id': 6071227511780497000, 'create_suspended': '0x0', 'process': '0x00000000', 'process_handle': '0xffffffff', 'return': 0, 'thread': '0x00000000'}
analyzed_because: Parent is being analyzed
files_created: \Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma,
\Users\Administrator\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma~RF3e02b2be.TMP
monitored: true
parent: 0xffffe0014409e680
new: true
pid: 2680
kpid: 0xffffe00144f57080
ppid: 9
time: Wed, 21 Dec 2022 12:10:41 UTC
proc: false
process_name: chrome.exe
#
fileChecks the file reputation of the specified hash.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | A CSV list of hashes of the file to query. Supports MD5, SHA1, and SHA256. | Required |
long | Whether to return full response for scans. Default is "false". Possible values are: True, False. | Optional |
threshold | If the number of positives is higher than the threshold, the file will be considered malicious. If the threshold is not specified, the default file threshold, as configured in the instance settings, will be used. | Optional |
wait | Time (in seconds) to wait between tries if the API rate limit is reached. Default is "60". Default is 60. | Optional |
retries | Number of retries for the API rate limit. Default is "0". Default is 0. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
File.MD5 | String | Bad MD5 hash. |
File.Name | String | File name. |
File.SHA1 | String | Bad SHA1 hash. |
File.sha256 | String | Bad SHA256 hash. |
File.EntryID | String | The entry ID of the file. |
File.Malicious.Vendor | String | The vendor that reported the file as malicious. |
File.Malicious.Description | String | A description explaining why the file was determined to be malicious. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
ThreatGrid.File.PositiveDetections | number | Number of engines that positively detected the indicator as malicious. |
ThreatGrid.File.DetectionEngines | number | Total number of engines that checked the indicator. |
ThreatGrid.File.tgLink | string | ThreatGrid permanent link. |
#
ipChecks the reputation of an IP address.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | IP address to check. | Required |
long | Whether to return full response for detected URLs. Default is "false". Possible values are: True, False. | Optional |
threshold | If the number of positives is higher than the threshold, the IP address will be considered malicious. If the threshold is not specified, the default IP threshold, as configured in the instance settings, will be used. | Optional |
sampleSize | The number of samples from each type (resolutions, detections, etc.) to display for long format. Default is "10". Default is 10. | Optional |
wait | Time (in seconds) to wait between tries if the API rate limit is reached. Default is "60". Default is 60. | Optional |
retries | Number of retries for API rate limit. Default is "0". Default is 0. | Optional |
fullResponse | Whether to return all results, which can be thousands. Default is "false". We recommend that you don't return full results in playbooks. Possible values are: True, False. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
IP.Address | String | Bad IP address. |
IP.ASN | String | Bad IP ASN. |
IP.Geo.Country | String | Bad IP country. |
ThreatGrid.IP.indicator | String | IP address. |
ThreatGrid.IP.confidence | Number | Indicator confidence between 0-99. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
#
urlChecks the reputation of a URL.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | A comma-seperated list of URLs to check. This command will not work properly on URLs containing commas. | Required |
sampleSize | The number of samples from each type (resolutions, detections, etc.) to display for long format. Default is 10. | Optional |
long | Whether to return the full response for the detected URLs. Possible values are: True, False. | Optional |
threshold | If the number of positives is higher than the threshold, the URL will be considered malicious. If the threshold is not specified, the default URL threshold, as configured in the instance settings, will be used. | Optional |
submitWait | Time (in seconds) to wait if the URL does not exist and is submitted for scanning. Default is "0". Default is 0. | Optional |
wait | Time (in seconds) to wait between tries if the API rate limit is reached. Default is "60". Default is 60. | Optional |
retries | Number of retries for API rate limit. Default is "0". Default is 0. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
URL.Data | String | Bad URLs found. |
URL.Malicious.Vendor | String | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | String | For malicious URLs, the reason that the vendor made the decision. |
URL.PositiveDetections | Number | Number of engines that positively detected the indicator as malicious. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
ThreatGrid.URL.url | String | The URL. |
ThreatGrid.URL.detection_engines | Number | Number of engines |
ThreatGrid.URL.positive_engines | Number | Number of positive engines |
#
domainChecks the reputation of a domain.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | Domain name to check. | Required |
long | Whether to return the full response for detected URLs. Default is "false". Possible values are: True, False. | Optional |
sampleSize | The number of samples from each type (resolutions, detections, etc.) to display for long format. Default is 10. | Optional |
threshold | If the number of positives is higher than the threshold, the domain will be considered malicious. If the threshold is not specified, the default domain threshold, as configured in the instance settings, will be used. | Optional |
wait | Time (in seconds) to wait between tries if the API rate limit is reached. Default is "60". Default is 60. | Optional |
retries | Number of retries for API rate limit. Default is "0". Default is 0. | Optional |
fullResponse | Whether to return all results, which can be thousands. Default is "false". We recommend that you don't return full results in playbooks. Possible values are: True, False. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Domain.Name | String | Bad domain found. |
Domain.Malicious.Vendor | String | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | String | For malicious domains, the reason that the vendor made the decision. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
Domain.CreationDate | Date | The date that the domain was created. |
Domain.DNS | String | A list of IP objects resolved by DNS. |
Domain.WHOIS.NameServers | String | Name servers of the domain. |
Domain.WHOIS.Registrar.AbuseEmail | Unknown | The email address of the contact for reporting abuse. |
Domain.WHOIS.Registrar.AbusePhone | Unknown | The phone number of contact for reporting abuse. |
Domain.WHOIS.Registrar.Name | String | The name of the registrar, for example: "GoDaddy". |
Domain.WHOIS.ExpirationDate | Date | The expiration date of the domain. |
Domain.WHOIS.DomainStatus | String | The status of the domain. |
ThreatGrid.Domain.domain | String | The domain name. |
#
threat-grid-domain-samples-listReturns a list of samples associated with a Domain.
#
Base Commandthreat-grid-domain-samples-list
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain to search for. | Required |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_size | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.DomainAssociatedSample.domain | string | The domain. |
ThreatGrid.DomainAssociatedSample.samples | string | The associated samples. |
#
Command example!threat-grid-domain-samples-list domain=domain_example
#
Context Example#
Human Readable Output#
List of samples associated to the domain - domain_example :Showing page 1. Current page size: 50 |Filename|Login|Private|Sample|Sha256|Timestamp| |---|---|---|---|---|---| | domainexample.url | login_name | false | sample_e | sha256_example | 2022-12-22T08:30:57Z | | file_name | | false | sample_e | sha256_e | 2022-12-22T08:29:38Z |
#
threat-grid-ip-samples-listReturns a list of samples associated with an IP.
#
Base Commandthreat-grid-ip-samples-list
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP to search for. | Required |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_size | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.IpAssociatedSample.ip | string | The IP. |
ThreatGrid.IpAssociatedSample.samples | string | The associated samples. |
#
Command example!threat-grid-ip-samples-list ip=8.8.8.8
#
Context Example#
Human Readable Output#
List of samples associated to the ip - 8.8.8.8 :Showing page 1. Current page size: 50 |Filename|Login|Private|Sample|Sha256|Timestamp| |---|---|---|---|---|---| | filename | | false | sample_e | sha256_e | 2022-12-22T08:09:30Z | | file_name | | false | sample_e | sha256_e | 2022-12-22T08:07:40Z |
#
threat-grid-path-samples-listReturns a list of samples associated with a Path.
#
Base Commandthreat-grid-path-samples-list
#
InputArgument Name | Description | Required |
---|---|---|
path | The path to search for. A path is a slash-separated list of directory names followed by either a directory name or a file name. Path example: ‘/user/name/file’. | Required |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_zise | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.PathAssociatedSample.path | string | The Path. |
ThreatGrid.PathAssociatedSample.samples | string | The associated samples. |
#
Command example!threat-grid-path-samples-list path=user
#
Context Example#
Human Readable Output#
List of samples associated to the path - user :Showing page 1. Current page size: 50 |Filename|Login|Private|Sample|Sha256|Timestamp| |---|---|---|---|---|---| | user | | false | sample_e | sha256_e | 2022-11-11T08:26:04Z | | file_name | | false | sample_e | sha256_e | 2022-10-30T13:09:35Z |
#
threat-grid-url-samples-listReturns a list of samples associated with an URL.
#
Base Commandthreat-grid-url-samples-list
#
InputArgument Name | Description | Required |
---|---|---|
url | The target URL. Please provide the URL in the format http://example.com:80/ . | Required |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_zise | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.UrlAssociatedSample.url | string | The URL. |
ThreatGrid.UrlAssociatedSample.samples | string | The associated samples. |
#
Command example!threat-grid-url-samples-list url=http://domain_example:80/
#
Context Example#
Human Readable Output#
List of samples associated to the url - sha256_example :Showing page 1. Current page size: 50 |Filename|Login|Private|Sample|Sha256|Timestamp| |---|---|---|---|---|---| | domainexample.url | loginname | false | sample_id | sha256_example | 2022-12-22T08:36:44Z | | file_name | | false | sample_id | sha256_example | 2022-12-22T08:35:03Z | | file_name | | false | sample_id | sha256_example | 2022-12-22T08:35:03Z | | domain_example.url | login_name | false | sample_e | sha256_example | 2022-12-22T08:30:57Z |
#
threat-grid-registry-key-samples-listReturns a list of samples associated with a specified registry key.
#
Base Commandthreat-grid-registry-key-samples-list
#
InputArgument Name | Description | Required |
---|---|---|
registry_key | The registry key to search for. | Required |
after | "A date/time (ISO 8601), restricting results to samples submitted after it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
before | "A date/time (ISO 8601), restricting results to samples submitted before it. Please use the following date/time format. YYYY-MM-DD Thhmmss+|-hhmm e.g. : 2012-04-19T04:00:55-0500". | Optional |
limit | The maximum number of records to retrieve. Default is 50. | Optional |
page_size | The number of items per page. | Optional |
page | Page number of paginated results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.RegistryKeyAssociatedSample.key | string | The Registry Key. |
ThreatGrid.RegistryKeyAssociatedSample.samples | string | The associated samples. |
#
Command example!threat-grid-registry-key-samples-list registry_key=ChangeNotice
#
Context Example#
Human Readable Output#
List of samples associated to the registry_key - ChangeNotice :Showing page 1. Current page size: 50 No entries.
#
threat-grid-ip-associated-domainsReturns a list of domains associated with the IP.
#
Base Commandthreat-grid-ip-associated-domains
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP to search for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.IpAssociatedDomain.ip | string | The IP. |
ThreatGrid.IpAssociatedDomain.domains | string | The associated Domain. |
#
Command example!threat-grid-ip-associated-domains ip=8.8.8.8
#
Context Example#
Human Readable Output#
List of domains associated to the ip - 8.8.8.8 :
Domain domain2 domain1
#
threat-grid-ip-associated-urlsReturns a list of URLs associated to the IP.
#
Base Commandthreat-grid-ip-associated-urls
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP to search for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.IpAssociatedUrl.ip | string | The IP. |
ThreatGrid.IpAssociatedUrl.urls | string | The associated URL. |
#
Command example!threat-grid-ip-associated-urls ip=8.8.8.8
#
Context Example#
Human Readable Output#
List of urls associated to the ip - 8.8.8.8 :
Sha256 Url sha256 ThreatGrid_IpAssociatedUrl_urls[0]_url sha256 ThreatGrid_IpAssociatedUrl_urls[1]_url
#
threat-grid-domain-associated-urlsReturns a list of URLs associated to the domain.
#
Base Commandthreat-grid-domain-associated-urls
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain to search for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.DomainAssociatedUrl.domain | string | The Domain. |
ThreatGrid.DomainAssociatedUrl.urls | string | The associated URL. |
#
Command example!threat-grid-domain-associated-urls domain=domain_example
#
Context Example#
Human Readable Output#
List of urls associated to the domain - domain_example :
Sha256 Url sha256 some_url sha256 some_url
#
threat-grid-domain-associated-ipsReturns a list of IPs associated to the domain.
#
Base Commandthreat-grid-domain-associated-ips
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain to search for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatGrid.DomainAssociatedIp.domain | String | The Domain. |
ThreatGrid.DomainAssociatedIp.ips | String | The associated IP. |
#
Command example!threat-grid-domain-associated-ips domain=domain_example
#
Context Example#
Human Readable Output#
List of ips associated to the domain - domain_example :
Ip ip_address ip_address