ANYRUN Detonate File Windows
ANY.RUN Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
This playbook submits a file extracted from an incident attachment to the ANY.RUN cloud sandbox for dynamic analysis in an Windows environment. It helps to automate malware detonation and behavior observation on Windows OS.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- AnyRunSandbox
#
Scripts- IsIntegrationAvailable
#
Commands- anyrun-detonate-file-windows
- anyrun-get-analysis-report
- anyrun-get-analysis-verdict
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
file | XSOAR Entry ID | ${File.EntryID} | Optional |
incident_info | XSOAR Incident | ${incident} | Optional |
env_locale | Operation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive. | en-US | Optional |
env_bitness | Bitness of Operation System. Supports 32, 64 | 64 | Optional |
env_version | Version of OS. Supports: 7, 10, 11 | 10 | Optional |
env_type | Environment preset type. You can select **development** env for OS Windows 10 x64. For all other cases, **complete** env is required | complete | Optional |
opt_network_connect | Network connection state. | True | Optional |
opt_network_fakenet | FakeNet feature status. | False | Optional |
opt_network_tor | TOR using. | False | Optional |
opt_network_geo | Tor geo location option. Example: US, AU. | fastest | Optional |
opt_network_mitm | HTTPS MITM proxy option. | False | Optional |
opt_network_residential_proxy | Residential proxy using. | False | Optional |
opt_network_residential_proxy_geo | Residential proxy geo location option. Example: US, AU. | fastest | Optional |
opt_privacy_type | Privacy settings. Supports: public, bylink, owner, byteam. | bylink | Optional |
opt_timeout | Timeout option. Size range: 10-660. | 240 | Optional |
obj_ext_cmd | Optional command line | Optional | |
obj_ext_startfolder | Start object from. Supports: desktop, home, downloads, appdata, temp, windows, root | temp | Optional |
obj_force_elevation | Forces the file to execute with elevated privileges and an elevated token (for PE32, PE32+, PE64 files only) | False | Optional |
obj_ext_extension | Change extension to valid | True | Optional |
#
Playbook OutputsThere are no outputs for this playbook.