Skip to main content

ANYRUN Detonate File Windows

This Playbook is part of the ANY.RUN Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This playbook submits a file extracted from an incident attachment to the ANY.RUN cloud sandbox for dynamic analysis in an Windows environment. It helps to automate malware detonation and behavior observation on Windows OS.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • AnyRunSandbox

Scripts#

  • IsIntegrationAvailable

Commands#

  • anyrun-detonate-file-windows
  • anyrun-get-analysis-report
  • anyrun-get-analysis-verdict

Playbook Inputs#


NameDescriptionDefault ValueRequired
fileXSOAR Entry ID${File.EntryID}Optional
incident_infoXSOAR Incident${incident}Optional
env_localeOperation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive.en-USOptional
env_bitnessBitness of Operation System. Supports 32, 6464Optional
env_versionVersion of OS. Supports: 7, 10, 1110Optional
env_typeEnvironment preset type. You can select **development** env for OS Windows 10 x64. For all other cases, **complete** env is requiredcompleteOptional
opt_network_connectNetwork connection state.TrueOptional
opt_network_fakenetFakeNet feature status.FalseOptional
opt_network_torTOR using.FalseOptional
opt_network_geoTor geo location option. Example: US, AU.fastestOptional
opt_network_mitmHTTPS MITM proxy option.FalseOptional
opt_network_residential_proxyResidential proxy using.FalseOptional
opt_network_residential_proxy_geoResidential proxy geo location option. Example: US, AU.fastestOptional
opt_privacy_typePrivacy settings. Supports: public, bylink, owner, byteam.bylinkOptional
opt_timeoutTimeout option. Size range: 10-660.240Optional
obj_ext_cmdOptional command lineOptional
obj_ext_startfolderStart object from. Supports: desktop, home, downloads, appdata, temp, windows, roottempOptional
obj_force_elevationForces the file to execute with elevated privileges and an elevated token
(for PE32, PE32+, PE64 files only)
FalseOptional
obj_ext_extensionChange extension to validTrueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


ANYRUN Detonate File Windows