ThreatZone
ThreatZone Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.9.0 and later.
ThreatZone malware analysis sandboxing. This integration was integrated and tested with ThreatZone
#
Configure ThreatZone on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for ThreatZone.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL (e.g. https://app.threat.zone) True ThreatZone API Key True Source Reliability Reliability of the source. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
tz-sandbox-upload-sampleSubmits a sample to ThreatZone for sandbox analysis.
#
Base Commandtz-sandbox-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | Entry ID of the file to submit. | Required |
environment | Choose what environment you want to run your submission. Possible values are: w7_x64, w10_x64, w11_x64. Default is w7_x64. | Optional |
private | Privacy of the submission. Possible values are: true, false. Default is true. | Optional |
timeout | Duration of the submission analysis. Possible values are: 60, 120, 180, 300. Default is 60. | Optional |
work_path | The working path of the submission. Possible values are: desktop, root, appdata, windows, temp. Default is desktop. | Optional |
mouse_simulation | Enable mouse simulation. Possible values are: true, false. Default is false. | Optional |
https_inspection | Https inspection to read encrypted traffic. Possible values are: true, false. Default is false. | Optional |
internet_connection | Enable internet connection. Possible values are: true, false. Default is false. | Optional |
raw_logs | Raw logs. Possible values are: true, false. Default is false. | Optional |
snapshot | Snapshot. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatZone.Submission.Sandbox.UUID | String | UUID of sample. |
ThreatZone.Limits.E_Mail | String | The owner e-mail of current plan. |
ThreatZone.Limits.API_Limit | String | The remaining/total API request limits of the current plan. |
ThreatZone.Limits.Concurrent_Limit | String | The remaining/total concurrent analysis limits of the current plan. |
ThreatZone.Limits.Daily_Submission_Limit | String | The remaining/total daily submission limits of the current plan. |
#
tz-static-upload-sampleSubmits a sample to ThreatZone for static analysis.
#
Base Commandtz-static-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | Entry ID of the file to submit. | Required |
private | If this is false then everyone can see the submisison. If this is true then only your workspace participants can see the submission. Possible values are: true, false. Default is false. | Optional |
extension_check | If extension check is true and you do not know the submission extension or mimetype then our systems automatically detects file extension and mimetype. Possible values are: true, false. Default is true. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatZone.Submission.Static.UUID | String | UUID of sample. |
ThreatZone.Limits.E_Mail | String | The owner e-mail of current plan. |
ThreatZone.Limits.API_Limit | String | The remaining/total API request limits of the current plan. |
ThreatZone.Limits.Concurrent_Limit | String | The remaining/total concurrent analysis limits of the current plan. |
ThreatZone.Limits.Daily_Submission_Limit | String | The remaining/total daily submission limits of the current plan. |
#
tz-cdr-upload-sampleSubmits a sample to ThreatZone for CDR.
#
Base Commandtz-cdr-upload-sample
#
InputArgument Name | Description | Required |
---|---|---|
entry_id | Entry ID of the file to submit. | Required |
private | If this is false then everyone can see the submisison. If this is true then only your workspace participants can see the submission. Possible values are: true, false. Default is true. | Optional |
extension_check | If extension check is true and you do not know the submission extension or mimetype then our systems automatically detects file extension and mimetype. Possible values are: true, false. Default is true. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatZone.Submission.CDR.UUID | String | UUID of sample. |
ThreatZone.Limits.E_Mail | String | The owner e-mail of current plan. |
ThreatZone.Limits.API_Limit | String | The remaining/total API request limits of the current plan. |
ThreatZone.Limits.Concurrent_Limit | String | The remaining/total concurrent analysis limits of the current plan. |
ThreatZone.Limits.Daily_Submission_Limit | String | The remaining/total daily submission limits of the current plan. |
#
tz-get-resultRetrive the analysis result from ThreatZone.
#
Base Commandtz-get-result
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the submission. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ThreatZone.Analysis.STATUS | String | The status of the submission scanning process. |
ThreatZone.Analysis.LEVEL | String | Threat Level of the scanned file. (malicious, suspicious or informative). |
ThreatZone.Analysis.INFO | String | Contains the file name, scan process status and public status. |
ThreatZone.Analysis.REPORT | String | The analysis report of the submission. |
ThreatZone.Analysis.MD5 | String | The md5 hash of the submission. |
ThreatZone.Analysis.SHA1 | String | The sha1 hash of the submission. |
ThreatZone.Analysis.SHA256 | String | The sha256 hash of the submission. |
ThreatZone.Analysis.UUID | String | The UUID of the submission. |
ThreatZone.IOC.URL | List | The URL data extracted from IOC. |
ThreatZone.IOC.IP | List | The IP data extracted from IOC. |
ThreatZone.IOC.DOMAIN | List | The DOMAIN data extracted from IOC. |
ThreatZone.IOC.EMAIL | List | The EMAIL data extracted from IOC. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | The reliability of the source providing the intelligence data. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | unknown | The vendor used to calculate the score. |
#
tz-get-sanitizedDownloads and uploads sanitized file from ThreatZone API to WarRoom & Context Data.
#
Base Commandtz-get-sanitized
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the submission. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
InfoFile.Extension | String | Extension of the file sanitized by CDR. |
InfoFile.Name | String | The name of the file sanitized by CDR. |
InfoFile.Size | Number | Size of the file sanitized by CDR. |
InfoFile.EntryID | String | EntryID of the file sanitized by CDR. |
InfoFile.Info | String | Info of the file sanitized by CDR. |
InfoFile.MD5 | String | MD5 hash of the file sanitized by CDR. |
InfoFile.SHA1 | String | SHA1 hash of the file sanitized by CDR. |
InfoFile.SHA256 | String | SHA256 hash of the file sanitized by CDR. |
InfoFile.SHA512 | String | SHA512 hash of the file sanitized by CDR. |
InfoFile.SSDeep | String | SSDeep hash of the file sanitized by CDR. |
#
tz-check-limitsCheck the plan limits from ThreatZone API.
#
Base Commandtz-check-limits
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
ThreatZone.Limits.E_Mail | String | The owner e-mail of current plan. |
ThreatZone.Limits.API_Limit | String | The remaining/total API request limits of the current plan. |
ThreatZone.Limits.Concurrent_Limit | String | The remaining/total concurrent analysis limits of the current plan. |
ThreatZone.Limits.Daily_Submission_Limit | String | The remaining/total daily submission limits of the current plan. |
#
Command Exampletz-get-result uuid=95b6bc52-d040-4d82-a98b-af6fd5f6feea
(Sandbox)
tz-get-result uuid=7ddad84a-7f9b-4b56-b8f4-914287a0a1a3
(Static-Scan)
tz-get-result uuid=1170250a-40ac-4b73-84f7-3c0b6026d8af
(CDR)
#
Context Example for SandboxNote: Long output parts are truncated
#
Context Example for Static ScanNote: Long output parts are truncated
#
Context Example for CDRNote: Long output parts are truncated
#
Human Readable Output Example For SandboxANALYSIS TYPE | FILE_NAME | MD5 | PRIVATE | SHA1 | SHA256 | STATUS | THREAT_LEVEL | UUID |
---|---|---|---|---|---|---|---|---|
dynamic | 4fa7ece6f7c3866eb2c2eeb56c0b97f1b231afaf89cc77a73fde654bf256ab82.exe | cbb2add696989c174fc38c3782796f9b | true | f9a9dc82a60b041457b5280fa09ef891a379e079 | 4fa7ece6f7c3866eb2c2eeb56c0b97f1b231afaf89cc77a73fde654bf256ab82 | Submission is finished | Suspicious | 98b56bcf-7564-48a7-88a7-c0803a8bb6c6 |
#
Human Readable Output For Static-ScanANALYSIS TYPE | FILE_NAME | MD5 | PRIVATE | SHA1 | SHA256 | STATUS | THREAT_LEVEL | UUID |
---|---|---|---|---|---|---|---|---|
static | 75a8d3f14276963f76df3fe789f1d607d5d51dd63a86dde72cc38e9229d3ff4b | c1ee10ff2d67fbf0326b2c66a66a2f5e | false | b5ca1e30b68d158620c334c9489e36e188638c04 | 75a8d3f14276963f76df3fe789f1d607d5d51dd63a86dde72cc38e9229d3ff4b | Submission is finished | Malicious | 953cae36-e712-4bbd-b353-d3fa42b99dbd |
#
Human Readable Output For CDRANALYSIS TYPE | FILE_NAME | MD5 | PRIVATE | SHA1 | SHA256 | STATUS | THREAT_LEVEL | UUID |
---|---|---|---|---|---|---|---|---|
cdr | ef75466ef44f193e00c09e827937effd8f3114ef24d34e9b0972fa0fdd3805ba.doc | 269ca98fb9604d8cfe4298f2b966ff73 | false | b02833cd16afa4acd869ad48e00ebcc4211e40d9 | ef75466ef44f193e00c09e827937effd8f3114ef24d34e9b0972fa0fdd3805ba | Submission is finished | Not Measured | d3b1bea1-0b88-4676-a389-eb6eeae3c19c |