Instructions

How to Get Threat Intelligence Using TI Lookup Search Parameters

HomeInstructions on ANY.RUN

Strategies to Collect Threat Intelligence Using Search Parameters in TI Lookup

ANY.RUN‘s Threat Intelligence Lookup is a valuable helpful useful resource for security professionals looking for information on the newest cyber threats.

One in all many key choices of Threat Intelligence Lookup is its in depth search capabilities. The service affords over 40 fully completely different search parameters that could be blended to type explicit queries. These parameters allow you to filter and refine your search outcomes based mostly totally on assorted requirements, much like IOCs, behavioral indicators, and completely different associated information.

Let’s uncover each search parameter and provide examples of how they are often utilized in your investigations.

About Threat Intelligence Lookup

Threat Intelligence Lookup is a centralized platform for danger info exploration, assortment, and analysis.

On the core of Threat Intelligence Lookup lies a world group of over 400,000 security specialists. These folks actively contribute by submitting suspicious samples to the ANY.RUN sandbox for superior analysis every day.

The submission course of generates a wealth of valuable danger info, along with indicators of compromise (IOCs), which might be then extracted and built-in into Threat Intelligence Lookup.


Due to its integration with ANY.RUN’s Interactive Sandbox, prospects can entry real-time search outcomes, every linked to a corresponding sandbox session, enabling in-depth analysis of the acknowledged threats.

Search Parameters in TI Lookup

Search parameters in TI Lookup are divided into separate groups: duties, registry, environment, detection, module, connection, course of, group threats, file, synchronization, and URL.

Course of

Course of parameters search recommendation from the traits of duties (sandbox intervals).

threatName

The title of a specific danger: malware family, danger kind, and so forth., as acknowledged by the sandbox.

Occasions: “Phishing”, “xworm”, “ransomware”, “tycoon”.

submissionCountry

The nation from which the danger sample was submitted.

Occasions: “es”, “us”, “de”.

How to Get Threat Intelligence Using TI Lookup Search Parameters
Outcomes for a query that includes a danger title (Remcos) and nation (Brazil)

Proper right here is an occasion of a query for samples of the Remcos malware submitted by prospects in Brazil. The service provides a listing of sandbox intervals that correspond to the request.

Attempt it:

threatLevel

A verdict on the danger stage of the sample.

Examples: “malicious”, “suspicious”.

taskType

The form of the sample submitted to the sandbox.

Examples: “URL”, “file”.

You probably can modify the timeframe of your search to 180, 90, 60, 30, 7, 3, or 1 days

On this screenshot, you may even see a query for malicious URLs uploaded to the sandbox over the earlier 24 hours. TI Lookup exhibits a listing of the newest 100 intervals.

Attempt it:

Registry

Registry parameters search recommendation from explicit attributes related to registry modifications detected inside sandbox intervals. These parameters current insights into how a danger interacts with the Residence home windows registry.

registryKey

The exact key contained in the registry hive the place the modification occurred. Please discover: when coming into registry keys, use a double backslash () to flee the one backslash.

Examples: “Residence windowsCurrentVersionRunOnce”, “Residence home windows NTCurrentVersionWindows”.

registryName

The title of the Residence home windows Registry key space.

Examples: “browseinplace”, “docobject”, “isshortcut”.

registryValue

The price of the Residence home windows Registry key.

Examples: “net exploreriexplore.exe”.

The service provides events, synchronization, and group threats associated to the query

Using the query above, we’re in a position to set up threats that goal to execute malicious code by scheduled duties.

Attempt it:

Environment

These parameters are used to produce context in regards to the environment the place a danger was detected or executed.

os

The exact mannequin of Residence home windows used inside the environment.

Examples: “11”, “10”, “7”.

osSoftwareSet

The software program program bundle of capabilities put in on the OS.

Examples: “clear”, “office”, “full”.

osBitVersion

The bitness of the working system, 32-bit or 64-bit.

Examples: “32”, “64”.

The service provides Lumma analysis intervals which you could possibly uncover

We are going to use these parameters to, as an illustration, uncover Residence home windows 11 x64 sandbox intervals containing analysis of the Lumma stealer launched inside the service over the earlier 14 days.

Attempt it:

Detection

These parameters are utilized to elucidate the detection signatures and MITRE TTPs referring to the execution of threats inside the sandbox.

ruleName

The title of the detection rule.

Examples: “Executable content material materials was dropped or overwritten”, “Phishing has been detected”.

ruleThreatLevel

The danger stage assigned to a specific event.

Examples: “malicious”, “suspicious”, “info”.

MITRE

Methods utilized by the malware consistent with the MITRE ATT&CK classification.

Examples: “T1071”, “T1114.001”.

The service provides events, mutexes, info, group threats, and intervals

Let’s have in mind a query combining the MITRE ATT&CK method T1053.005, which describes a typical persistence mechanism, with a detection rule for threats that steal browser credentials.

Attempt it:

Module

Module parameters search recommendation from explicit modules or elements inside a danger. This usually is a DLL, library, or completely different executable that is loaded by the first executable.

moduleImagePath

The overall path to the module’s image file, the location on the disk the place the module’s executable is saved.

Examples: “SysWOW64cryptbase.dll”, “SysWOW64msasn1.dll”.

The service yields events, info, and completely different results in response to the query

Above you may even see an occasion of a query that seems for all circumstances of sandbox intervals the place KernelBase.dll was generally known as.

Attempt it:

Connection

The Connection parameters describe network-related options of a danger.

domainName

The world title that was recorded by means of the danger execution in a sandbox.

Examples: “twentyvd20sb[.]excessive”, “5.tcp.ngrok[.]io”.

destinationIP

The IP sort out of the group connection that was established or tried.

Examples: “147[.]185[.]221[.]22”, “162[.]125[.]66[.]15”.

destinationPort

The group port by which the connection was established.

Examples: “49760”, “49780”.


destinationIpAsn

Detected ASN.

Examples: “akamai-as”, “akamai worldwide b.v.”.

destinationIPgeo

Two-letter nation or space code of the detected IP geolocation.

Examples: “ae”, “de”.

ja3, ja3s, jarm

Sorts of TLS fingerprints that will level out positive threats.

Examples: “1af33e1657631357c73119488045302c” (JA3S), “a0e9f5d64349fb13191bc781f81f42e1” (JA3).

You probably can uncover group threats tab to see triggered Suricata IDS tips

Throughout the picture above, we’re in a position to see a query that searches for threats that made connections to IP addresses located inside the Czech Republic (CZ), belonging to Cogent Communications.

Attempt it:

Course of

The subsequent parameters relate to processes registered all through energetic sandbox intervals.

imagePath

Full path to course of image.

Examples: “System32conhost.exe”, “Frameworkv4.0.30319RegAsm.exe”.

commandLine

The overall command line that initiated the tactic.

Examples: “PDQConnectAgentpdq-connect-agent.exe –service”, “system32cmd.exe /c”.

The events tab reveals the exact processes akin to the query

Using these parameters, we’re in a position to uncover Strela stealer samples that use net.exe to mount a C2 server containing a ‘davwwwroot’ folder.

Attempt it:

Group Threats

These parameters describe network-based threats detected by the Suricata intrusion detection system (IDS).

suricataMessage

The define of the danger consistent with Suricata.

Examples: “ET INFO 404/Snake/Matiex Keylogger Mannequin Exterior IP Look at”, “STEALER [ANY.RUN] Stealc HTTP POST Request”.

Search using Suricata message reveals malconf IPs of Redline

We are going to use a Suricata message to seek out additional samples, along with IOCs, along with these extracted straight from malware’s configs, referring to a specific danger.

Attempt it:

suricataClass

The category assigned to the danger by Suricata based mostly totally on its traits.

Examples: “misc train”, “a group trojan was detected”.

suricataID

The distinctive identifier of the Suricata rule.

Examples: “2044767”, “8001997”.

suricataThreatLevel

The choice on the danger consistent with Suricata based mostly totally on its potential affect.

Examples: “malicious”, “suspicious”, “info”

The service returns Suricata IDS tips detecting njRAT

By combining this parameter with threatName, we’re in a position to collect Suricata tips referring to a specific malware.

Attempt it:

File

These parameters describe file-related options of a danger.

filePath

The overall path to the file on the system.

Examples: “invoice”, “order”

A query looking for intervals the place a readme.txt file was dropped on the desktop, a typical ransomware sign

We are going to use this parameter along with threatLevel to look out explicit info in sandbox intervals with malicious content material materials.

Attempt it:

fileExtension

The extension that signifies the file kind.

Examples: “exe”, “dll”.

sha256, sha1, md5

Hash values referring to a file.

Examples: “1412faf1bfd96e91340cedcea80ee09d”, “ce554fe53b2620c56f6abb264a588616”

In response to a hash query, the service returns events, group threats, info, and completely different info

We are going to use the hash of a malicious file to seek out the exact malware family it pertains to.

Attempt it:

Synchronization

These parameters describe synchronization-related actions inside a danger, much like mutexes.

syncObjectName

The title or identifier of the synchronization object used.

Examples: “rmc”, “m0yv”.

syncObjectType

The form of synchronization object used.

Examples: “event”, “mutex”.


syncObjectOperation

The operation carried out on the synchronization object.

Examples: “create”, “open”.

The service provides an prolonged document of objects current in intervals containing analysis of the Xworm malware

By combining operation and sort parameters with threatName, we’re in a position to search for explicit mutexes or events created by means of the execution of a specific malware

Attempt it:

URL

These parameters describe group guests related to HTTP requests and responses.

url

The URL generally known as by the tactic.

Examples: “http://192[.]168[.]37[.]128:8880[/]zv8u”, “http://tventyvd20sb[.]excessive/v1/add[.]php”.

httpRequestContentType

The content material materials type of the HTTP request despatched to the server.

Examples: “software program/octet-stream”.

httpResponseContentType

The content material materials type of the HTTP response acquired from the server.

Examples: “textual content material/html”.

httpRequestFileType

The file type of the file being uploaded inside the HTTP request.

Examples: “binary”.

httpResponseFileType

The file type of the file being downloaded inside the HTTP response.

Examples: “binary”.

Outcomes for binary file requests in HijackLoader sandbox intervals

It is potential to utilize the parameter with threatName as soon as extra to look out binary info which have been requested by means of the analysis inside the sandbox.

Attempt it:

Conclusion

ANY.RUN’s Threat Intelligence Lookup affords a whole set of search parameters that permit security professionals to efficiently analyze and study threats. Using these search decisions, it’s possible you’ll set up and enrich your information on rising threats.

Attempt Threat Intelligence Lookup completely free →

About ANY.RUN

ANY.RUN helps higher than 400,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that consider every Residence home windows and Linux strategies. Our danger intelligence merchandise, TI Lookup, Yara Search and Feeds, present you uncover IOCs or info to be taught additional in regards to the threats and reply to incidents sooner.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button