The "Crowdstrike Falcon Sandbox - File Analysis with Cache" workflow template is designed for threat hunting and intelligence enrichment. It automates the process of submitting files to the Falcon Sandbox for malware analysis. The workflow checks for existing hash reputations in a local cache to avoid redundant analysis. If no prior data is found, the file is analyzed, and results, including Mitre TTPs and file properties, are cached for future reference, enhancing efficiency in threat detection and response.
Use Cases
Threat Hunting , Threat Intelligence Enrichment
Workflow Breakdown
Receives an URL of a file and an optional hash of the file.
If no Hash is provided, then SHA256 is calculated from the file.
Lookup global variables to see if the hash reputation has been saved in the past 24 hours.
If analysis data is found on local cache, the saved data is returned to the parent workflow.
When file is not found on cache and there are not previous analysis, then the file is submitted to analysis.
A summary of the analysis data is created and saved with the original api data.
Vendors
Utils, CrowdStrike, Torq
Workflow Output
Output information contains Mitre TTPs Summary, related hashes, file properties, malware family and observable's type and subtype as used in Torq Cases.
Tips
Set "Provide Raw Data Analysis" to true or false to add or remove original vendor information to the output.