Skip to main content

ThreatZone

This Integration is part of the ThreatZone Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.9.0 and later.

Threat.Zone is a hypervisor-based, automated and interactive tool for analyzing malware , you can fight new generation malwares.

Configure ThreatZone on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for ThreatZone.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URL (e.g. https://app.threat.zone)True
    ThreatZone API KeyTrue
    Source ReliabilityReliability of the source.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

tz-sandbox-upload-sample#


Submits a sample to ThreatZone for sandbox analysis.

Base Command#

tz-sandbox-upload-sample

Input#

Argument NameDescriptionRequired
entry_idEntry ID of the file to submit.Required
environmentChoose what environment you want to run your submission. Possible values are: w7_x64, w10_x64, w11_x64. Default is w7_x64.Optional
privatePrivacy of the submission. Possible values are: true, false. Default is true.Optional
timeoutDuration of the submission analysis. Possible values are: 60, 120, 180, 300. Default is 60.Optional
work_pathThe working path of the submission. Possible values are: desktop, root, appdata, windows, temp. Default is desktop.Optional
mouse_simulationEnable mouse simulation. Possible values are: true, false. Default is false.Optional
https_inspectionHttps inspection to read encrypted traffic. Possible values are: true, false. Default is false.Optional
internet_connectionEnable internet connection. Possible values are: true, false. Default is false.Optional
raw_logsRaw logs. Possible values are: true, false. Default is false.Optional
snapshotSnapshot. Possible values are: true, false. Default is false.Optional

Context Output#

PathTypeDescription
ThreatZone.Submission.Sandbox.UUIDStringUUID of sample.
ThreatZone.Submission.Sandbox.URLStringURL of analysis of sample.
ThreatZone.Limits.E_MailStringThe owner e-mail of current plan.
ThreatZone.Limits.API_LimitStringThe remaining/total API request limits of the current plan.
ThreatZone.Limits.Concurrent_LimitStringThe remaining/total concurrent analysis limits of the current plan.
ThreatZone.Limits.Daily_Submission_LimitStringThe remaining/total daily submission limits of the current plan.

tz-static-upload-sample#


Submits a sample to ThreatZone for static analysis.

Base Command#

tz-static-upload-sample

Input#

Argument NameDescriptionRequired
entry_idEntry ID of the file to submit.Required

Context Output#

PathTypeDescription
ThreatZone.Submission.Static.UUIDStringUUID of sample.
ThreatZone.Submission.Static.URLStringURL of analysis of sample.
ThreatZone.Limits.E_MailStringThe owner e-mail of current plan.
ThreatZone.Limits.API_LimitStringThe remaining/total API request limits of the current plan.
ThreatZone.Limits.Concurrent_LimitStringThe remaining/total concurrent analysis limits of the current plan.
ThreatZone.Limits.Daily_Submission_LimitStringThe remaining/total daily submission limits of the current plan.

tz-cdr-upload-sample#


Submits a sample to ThreatZone for CDR.

Base Command#

tz-cdr-upload-sample

Input#

Argument NameDescriptionRequired
entry_idEntry ID of the file to submit.Required

Context Output#

PathTypeDescription
ThreatZone.Submission.CDR.UUIDStringUUID of sample.
ThreatZone.Submission.CDR.URLStringURL of analysis of sample.
ThreatZone.Limits.E_MailStringThe owner e-mail of current plan.
ThreatZone.Limits.API_LimitStringThe remaining/total API request limits of the current plan.
ThreatZone.Limits.Concurrent_LimitStringThe remaining/total concurrent analysis limits of the current plan.
ThreatZone.Limits.Daily_Submission_LimitStringThe remaining/total daily submission limits of the current plan.

tz-get-result#


Retrive the analysis result from ThreatZone.

Base Command#

tz-get-result

Input#

Argument NameDescriptionRequired
uuidUUID of the submission.Required

Context Output#

PathTypeDescription
ThreatZone.Analysis.STATUSStringThe status of the submission scanning process.
ThreatZone.Analysis.LEVELStringThreat Level of the scanned file. (malicious, suspicious or informative).
ThreatZone.Analysis.URLStringThe result page url of the submission.
ThreatZone.Analysis.INFOStringContains the file name, scan process status and public status.
ThreatZone.Analysis.REPORTStringThe analysis report of the submission.
ThreatZone.Analysis.MD5StringThe md5 hash of the submission.
ThreatZone.Analysis.SHA1StringThe sha1 hash of the submission.
ThreatZone.Analysis.SHA256StringThe sha256 hash of the submission.
ThreatZone.Analysis.UUIDStringThe UUID of the submission.
ThreatZone.IOC.URLListThe URL data extracted from IOC.
ThreatZone.IOC.IPListThe IP data extracted from IOC.
ThreatZone.IOC.DOMAINListThe DOMAIN data extracted from IOC.
ThreatZone.IOC.EMAILListThe EMAIL data extracted from IOC.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.ReliabilityStringThe reliability of the source providing the intelligence data.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorunknownThe vendor used to calculate the score.

tz-get-sanitized#


Downloads and uploads sanitized file from ThreatZone API to WarRoom & Context Data.

Base Command#

tz-get-sanitized

Input#

Argument NameDescriptionRequired
uuidUUID of the submission.Required

Context Output#

PathTypeDescription
InfoFile.ExtensionStringExtension of the file sanitized by CDR.
InfoFile.NameStringThe name of the file sanitized by CDR.
InfoFile.SizeNumberSize of the file sanitized by CDR.
InfoFile.EntryIDStringEntryID of the file sanitized by CDR.
InfoFile.InfoStringInfo of the file sanitized by CDR.
InfoFile.MD5StringMD5 hash of the file sanitized by CDR.
InfoFile.SHA1StringSHA1 hash of the file sanitized by CDR.
InfoFile.SHA256StringSHA256 hash of the file sanitized by CDR.
InfoFile.SHA512StringSHA512 hash of the file sanitized by CDR.
InfoFile.SSDeepStringSSDeep hash of the file sanitized by CDR.

tz-check-limits#


Check the plan limits from ThreatZone API.

Base Command#

tz-check-limits

Input#

Argument NameDescriptionRequired

Context Output#

PathTypeDescription
ThreatZone.Limits.E_MailStringThe owner e-mail of current plan.
ThreatZone.Limits.API_LimitStringThe remaining/total API request limits of the current plan.
ThreatZone.Limits.Concurrent_LimitStringThe remaining/total concurrent analysis limits of the current plan.
ThreatZone.Limits.Daily_Submission_LimitStringThe remaining/total daily submission limits of the current plan.

Command Example#

tz-get-result uuid=95b6bc52-d040-4d82-a98b-af6fd5f6feea (Sandbox)

tz-get-result uuid=7ddad84a-7f9b-4b56-b8f4-914287a0a1a3 (Static-Scan)

tz-get-result uuid=1170250a-40ac-4b73-84f7-3c0b6026d8af (CDR)

Context Example for Sandbox#

Note: Long output parts are truncated

{
"DBotScore": {
"Indicator": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108",
"Reliability": "A+ - 3rd party enrichment",
"Score": 3,
"Type": "file",
"Vendor": "ThreatZone"
},
"File": {
"Hashes": [
{
"type": "MD5",
"value": "30bdb7e22e022bcf00d157f4da0e098e"
},
{
"type": "SHA1",
"value": "0cd47f6bb5bb8e8e9dc01286adcc493acf5dd649"
},
{
"type": "SHA256",
"value": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108"
}
],
"MD5": "30bdb7e22e022bcf00d157f4da0e098e",
"Malicious": {
"Description": null,
"Vendor": "ThreatZone"
},
"SHA1": "0cd47f6bb5bb8e8e9dc01286adcc493acf5dd649",
"SHA256": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108"
},
"ThreatZone": {
"Analysis": {
"INFO": {
"file_name": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108.exe",
"private": false
},
"LEVEL": 3,
"MD5": "30bdb7e22e022bcf00d157f4da0e098e",
"REPORT": {
"_id": "64f1e57fc9ae854321d3a7f5",
"additionalFiles": [],
"enabled": true,
"indicators": [
{
"_id": "64f1e5fb7949a5710e1e46be",
"attackCodes": [
"T1082"
],
"author": "Malwation",
"category": "Registry",
"description": "Target reads computer name",
"events": [
87430,
87431
],
"level": "Suspicious",
"name": "Reads computer name",
"score": 3
},
{
"_id": "64f1e5fb7949a5710e1e46bf",
"attackCodes": [
"T1112"
],
"author": "Malwation",
"category": "Registry",
"description": "Target changes registry value",
"events": [
4872,
4874,
4876,
4878,
4880,
4883,
5597,
5603,
5609,
5615,
5621,
5628
],
"level": "Malicious",
"name": "Registry changed",
"score": 7
},
{
"_id": "64f1e5fb7949a5710e1e46c0",
"attackCodes": [],
"author": "Malwation",
"category": "Registry",
"description": "Target reads the Internet Settings",
"events": [
5708,
6089,
6090,
6091,
6092,
6096,
6097,
6320,
6322,
6323
],
"level": "Suspicious",
"name": "Reads the Internet Settings",
"score": 5
},
{
"_id": "64f1e5fb7949a5710e1e46c1",
"attackCodes": [],
"author": "Malwation",
"category": "OS",
"description": "Target creates mutex",
"events": [
4842
],
"level": "Suspicious",
"name": "Create mutex",
"score": 5
},
{
"_id": "64f1e5fb7949a5710e1e46c2",
"attackCodes": [],
"author": "Malwation",
"category": "Network",
"description": "Target might try to open port and listen for incoming connection",
"events": [
5512,
5509,
5386,
5385,
87138,
87137,
87136,
87134
],
"level": "Suspicious",
"name": "Network connection",
"score": 4
}
],
"level": 3,
"media": [
{
"_id": "64f1e5fb7949a5710e1e46c3",
"id": "75d54195-ede8-48eb-8614-55d3658ed71c",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/1.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c4",
"id": "3eb5c83a-79ff-4e04-a173-b6c087a6f578",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/10.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c5",
"id": "b966535b-9aaa-4a0b-a1a1-863d8d23c830",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/2.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c6",
"id": "68eac6f4-68a1-411b-b349-b919aef3e166",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/3.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c7",
"id": "d76344b8-ba3d-411a-adf3-515990623dd9",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/4.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c8",
"id": "503b92df-98e1-4e6d-80bc-d18e8e25acb8",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/5.png"
},
{
"_id": "64f1e5fb7949a5710e1e46c9",
"id": "ac0228c8-79d1-40b8-930b-5ad1bbf8996f",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/6.png"
},
{
"_id": "64f1e5fb7949a5710e1e46ca",
"id": "56095f8a-2319-4169-856e-1acb05ec0f7f",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/7.png"
},
{
"_id": "64f1e5fb7949a5710e1e46cb",
"id": "4418068d-caa9-4e13-997e-3e631baf5d98",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/8.png"
},
{
"_id": "64f1e5fc7949a5710e1e46cc",
"id": "1b025f1b-b5d7-4491-bd29-8696513f04d6",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/9.png"
},
{
"_id": "64f1e5fc7949a5710e1e46cd",
"id": "4fc26473-0fe5-4ef7-9caa-050d8a7dbb11",
"path": "95b6bc52-d040-4d82-a98b-af6fd5f6feea/dynamic/overview/media/video.mp4"
}
],
"metafields": {
"environment": "w7_x64",
"https_inspection": false,
"internet_connection": false,
"mouse_simulation": false,
"raw_logs": false,
"snapshot": false,
"timeout": 60,
"work_path": "desktop"
},
"network": [],
"process": [
{
"_id": "64f1e5fb7949a5710e1e46bb",
"analysis": "basic",
"cmd": "cmd_line",
"eventcount": 1,
"eventid": 35,
"image": "win_image",
"method": "NtUserCreateProcess",
"operation": "create",
"pid": 3060,
"ppid": 1452,
"process_name": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108.exe",
"work_dir": "C:\\Windows\\system32\\"
},
{
"_id": "64f1e5fb7949a5710e1e46bc",
"analysis": "basic",
"cmd": "cmd_line",
"eventcount": 1,
"eventid": 36,
"image": "win_image",
"method": "NtUserCreateProcess",
"operation": "create",
"pid": 656,
"ppid": 3060,
"process_name": "cmd.exe",
"work_dir": "C:\\Windows\\system32\\"
},
{
"_id": "64f1e5fb7949a5710e1e46bd",
"analysis": "basic",
"cmd": "cmd_line",
"eventcount": 1,
"eventid": 38,
"image": "win_image",
"method": "NtUserCreateProcess",
"operation": "create",
"pid": 2188,
"ppid": 656,
"process_name": "timeout.exe",
"work_dir": "C:\\Windows\\system32\\"
},
null
],
"status": 5,
"vnc": "https://app.threat.zone/cloudvnc/index.html?path=?token=95b6bc52-d040-4d82-a98b-af6fd5f6feea"
},
"SHA1": "0cd47f6bb5bb8e8e9dc01286adcc493acf5dd649",
"SHA256": "80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108",
"STATUS": 5,
"TYPE": "dynamic",
"URL": "https://app.threat.zone/submission/95b6bc52-d040-4d82-a98b-af6fd5f6feea",
"UUID": "95b6bc52-d040-4d82-a98b-af6fd5f6feea"
},
"IOC": {
"DOMAIN": [],
"EMAIL": [],
"IP": [],
"URL": []
}
}
}

Context Example for Static Scan#

Note: Long output parts are truncated

{
"DBotScore": {
"Indicator": "a480da20defb3ed0982abd90589aa23ddef915bf92bc41f0186e56bd7a728f2b",
"Reliability": "A+ - 3rd party enrichment",
"Score": 3,
"Type": "file",
"Vendor": "ThreatZone"
},
"File": {
"Hashes": [
{
"type": "MD5",
"value": "b6900c7d6942a08d829bcf9d68efd5b1"
},
{
"type": "SHA1",
"value": "500dabee3263b852788d46d3794a372f625c2c55"
},
{
"type": "SHA256",
"value": "a480da20defb3ed0982abd90589aa23ddef915bf92bc41f0186e56bd7a728f2b"
}
],
"MD5": "b6900c7d6942a08d829bcf9d68efd5b1",
"Malicious": {
"Description": null,
"Vendor": "ThreatZone"
},
"SHA1": "500dabee3263b852788d46d3794a372f625c2c55",
"SHA256": "a480da20defb3ed0982abd90589aa23ddef915bf92bc41f0186e56bd7a728f2b"
},
"ThreatZone": {
"Analysis": {
"INFO": {
"file_name": "AIT.msi",
"private": false
},
"LEVEL": 3,
"MD5": "b6900c7d6942a08d829bcf9d68efd5b1",
"REPORT": {
"analysis_time": "33.30021 seconds",
"embedded_files": [],
"enabled": true,
"file_info": {
"_id": "65f74ad56a77b38eba4bab5c",
"entropy": 7.66,
"file_type": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Autodesk Inventory Tool, Author: Autodesk, Keywords: Installer, Comments: This installer database contains the logic and data required to install Autodesk Inventory Tool., Template: Intel;1033, Revision Number: {D9AFAE91-12C7-4C1D-8466-404FA23EEB67}, Create Time/Date: Mon Jul 17 12:55:22 2023, Last Saved Time/Date: Mon Jul 17 12:55:22 2023, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2",
"filesize": "7.56 MB",
"md5": "b6900c7d6942a08d829bcf9d68efd5b1",
"mime_type": "application/x-msi",
"sha1": "500dabee3263b852788d46d3794a372f625c2c55",
"sha256": "a480da20defb3ed0982abd90589aa23ddef915bf92bc41f0186e56bd7a728f2b",
"ssdeep": "98304:mbsxVo2DmWxpMvizM6+Q2+RsN4Tc9N9xhJSPDQ/zLggse/Z39zW/iW8KgWWcC3eX:6sxa2CWgkM6olOgH78D6LgOhNwLLX"
},
"ioc": {
"_id": "65f74ad56a77b38eba4bab5a",
"domain": [],
"email": [],
"http_requests": [],
"ip": [],
"irc": [],
"possible_payload": [],
"ssdp_requests": [],
"url": [
]
},
"level": 3,
"matched_yara_rules": {
"_id": "65f74ad56a77b38eba4bab5b",
"info": [
"gzip",
"contains_base64",
"domain",
"office_magic_bytes",
"NETexecutableMicrosoft",
"IP",
"url",
"maldoc_OLE_file_magic_number"
],
"malware": [],
"suspicious": [
"anti_dbg",
"DebuggerCheck__API",
"Anti_Automated_Sandbox",
"Qemu_Detection",
"Misc_Suspicious_Strings",
"win_files_operation",
"db_connection",
"VMWare_Detection_1",
"VBox_Detection",
"Embedded_PE",
"win_registry",
"Debugging_API"
]
},
"ole_streams": [],
"report_info": {
"dde_links": [],
"external_relationships": [],
"vba_project_bin_hash": null,
"vba_stomping": false
},
"scanType": "Office",
"score": 7,
"status": 5
},
"SHA1": "500dabee3263b852788d46d3794a372f625c2c55",
"SHA256": "a480da20defb3ed0982abd90589aa23ddef915bf92bc41f0186e56bd7a728f2b",
"STATUS": 5,
"TYPE": "static",
"URL": "https://app.threat.zone/submission/ffd80363-005f-484d-af96-534c4c40d902",
"UUID": "ffd80363-005f-484d-af96-534c4c40d902"
},
"IOC": {
"DOMAIN": [],
"EMAIL": [],
"IP": [],
"URL": []
}
}
}

Context Example for CDR#

Note: Long output parts are truncated

{
"DBotScore": {
"Indicator": "945678e901efcd35ece87a1a0eba82f39feb7d45ea4d38330a4795d1338872ca",
"Reliability": "A+ - 3rd party enrichment",
"Score": 0,
"Type": "file",
"Vendor": "ThreatZone"
},
"File": {
"Hashes": [
{
"type": "MD5",
"value": "cf543c55343c6307349aafd098fb6958"
},
{
"type": "SHA1",
"value": "1bec0d7bfea812ca7aa1f5399bb7ff3671006331"
},
{
"type": "SHA256",
"value": "945678e901efcd35ece87a1a0eba82f39feb7d45ea4d38330a4795d1338872ca"
}
],
"MD5": "cf543c55343c6307349aafd098fb6958",
"SHA1": "1bec0d7bfea812ca7aa1f5399bb7ff3671006331",
"SHA256": "945678e901efcd35ece87a1a0eba82f39feb7d45ea4d38330a4795d1338872ca"
},
"ThreatZone": {
"Analysis": {
"INFO": {
"file_name": "fff2035c-def9-482c-9e1a-405c4d427833.docx",
"private": false
},
"LEVEL": 0,
"MD5": "cf543c55343c6307349aafd098fb6958",
"REPORT": {
"data": {
"analysis_time": "4.59101 seconds",
"description": "File sanitized successfully."
},
"enabled": true,
"level": 0,
"removed": [
"VBA Macro"
],
"sanitized": [],
"status": 5
},
"SHA1": "1bec0d7bfea812ca7aa1f5399bb7ff3671006331",
"SHA256": "945678e901efcd35ece87a1a0eba82f39feb7d45ea4d38330a4795d1338872ca",
"STATUS": 5,
"TYPE": "cdr",
"URL": "https://app.threat.zone/submission/1170250a-40ac-4b73-84f7-3c0b6026d8af",
"UUID": "1170250a-40ac-4b73-84f7-3c0b6026d8af"
},
"IOC": {
"DOMAIN": [],
"EMAIL": [],
"IP": [],
"URL": []
}
}
}

Human Readable Output Example For Sandbox#

FILE_NAMEMD5PRIVATESCAN_URLSHA1SHA256STATUSTHREAT_LEVELUUID
80b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108.exe30bdb7e22e022bcf00d157f4da0e098efalsehttps://app.threat.zone/submission/95b6bc52-d040-4d82-a98b-af6fd5f6feea0cd47f6bb5bb8e8e9dc01286adcc493acf5dd64980b5c38471c54298259cec965619fccb435641a01ee4254a3d7c62ec47849108Submission is finishedMalicious95b6bc52-d040-4d82-a98b-af6fd5f6feea

Human Readable Output For Static-Scan#

FILE_NAMEMD5PRIVATESCAN_URLSHA1SHA256STATUSTHREAT_LEVELUUID
0_nUlF45uRfpbPIaqC.pngfbce2f43185104ae8bf4d32571b19203falsehttps://app.threat.zone/submission/7ddad84a-7f9b-4b56-b8f4-914287a0a1a3e0ecee70f2704093a8fb620d61a995b561b65c20e38dae160633fb5bf65a982374f1c7725c25ed32e89dbe2dce3a8f486cfae3cbSubmission is finishedSuspicious7ddad84a-7f9b-4b56-b8f4-914287a0a1a3

Human Readable Output For CDR#

FILE_NAMEMD5PRIVATESCAN_URLSHA1SHA256STATUSTHREAT_LEVELUUID
fff2035c-def9-482c-9e1a-405c4d427833.docxcf543c55343c6307349aafd098fb6958falsehttps://app.threat.zone/submission/1170250a-40ac-4b73-84f7-3c0b6026d8af1bec0d7bfea812ca7aa1f5399bb7ff3671006331945678e901efcd35ece87a1a0eba82f39feb7d45ea4d38330a4795d1338872caSubmission is finishedNot Measured1170250a-40ac-4b73-84f7-3c0b6026d8af