Adaptive Sandbox Full Report Overview

This is an introduction to the MetaDefender Sandbox Full Report (Remote module).

Overview

Provides an overview of recent analysis activities and user statistics.

Link to report: Filescan.IO - Analysis Report for 9e7d694ed87ae95f9c25af5f3a5cea76188cd7c1c91ce49c92e25585f232d98e - Overview

Overview includes the following

Submission Info

  • Including the Name: File Name

  • Mediatype: Type or format of a file being analyzed

  • Hash: The unique ID of the file hashing calculation

  • Report ID: The unique ID for the Report

  • Submission Date: The timestamp of the scan

Tags

  • Tags are used to categorize or label files based on specific attributes, behaviors, or detected threats. These tags help users to highlight important information like file origin, vulnerability types, or known malware families.

ChatGPT

  • To help get summary using the ChatGPT integration.

Analysis Overview

The analysis overview includes all malicious results the Sandbox detected, for all verdicts, please see: https://docs.opswat.com/filescan/datasheet/verdict

  • Threat Indicators: They highlight potential malicious activities, suspicious behaviors or benign activities in files.
    • E.g. OSINT source detected malicious resource: Indicates a file or URL linked to a known malicious source based on Open Source Intelligence (OSINT).

Filters

With the help of the side panel, the user can filter down for verdict, tags, MITRE Techniques and Origin

  • MITRE Techniques
  • It allows users to identify and categorize specific techniques used by malware or attackers, as defined by the MITRE ATT&CK framework

File Details

It is comprehensive information about a specific file, including its hash, file type, size, and origin. This may also include metadata like version information, or the software used to create it. This feature is useful for analyzing potentially malicious files and understanding their characteristics.

Extended Details

This section dives deeper into the file's characteristics, possibly including information about its compilation, digital signatures, and other technical details.

  • Entropy: 7.1: This suggests a moderate level of randomness in the file, which can indicate potential encryption or obfuscation. Higher entropy values often raise red flags as they might signal that the file is hiding something.
  • ForensicAnalysisRecommended: false: This means that, based on the analysis, there’s no immediate need for a deeper forensic examination, which could imply that the file doesn't exhibit known signs of being malicious.

Indicators of Compromise (IOCs)

IOCs are extracted from the input binary or derived data (e.g. extracted files) of the analysis. Indicators that are highly likely to be an IOC are marked as interesting.

Threat Intelligence

Scan and analyze files with more than 300 features and match complex patterns in known malicious files to hunt threats and identify new and unknown malware. During the similarity search, files undergo a rigorous scanning procedure using the MetaDefender Sandbox static and file emulation technologies. This advanced technology extracts the most relevant and useful information from a given file.

Learn more about Threat Intelligence here: https://docs.opswat.com/filescan/operationalguide/similarity-search

Disassembly Section

This can be particularly useful for reverse engineering, malware analysis, or debugging purposes. In this section, you can see how the code is structured, which instructions are executed, and how different components of the file interact with each other.

Learn more about Disassembly here: https://docs.opswat.com/filescan/datasheet/showcase-reports#6-finding-interesting-things-via-disassembly

YARA Rules

It is used for identifying and classifying malware or suspicious files based on specific patterns. YARA, which stands for "Yet Another Recursive Acronym," allows users to create rules that can match certain characteristics within files, such as strings or byte sequences.

Extracted Strings

Further information that can be extracted from the file meta data.

Extracted files

The list of files that have been extracted from a scanned archive or binary. This feature is useful for analyzing the contents of complex files, such as executables or compressed archives, where multiple files may be contained within.

OSINT Lookups

OSINT utilizes the hash and other IOCs to check against the online reputation services to make sure that the file is safe, it also lists out the malicious components as tags for better awareness.

Geolocation

The geolocation feature provides information about the geographical locations associated with a file, typically based on its network activity or the IP addresses it may communicate with.

If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard