The "Analyze Files with ANY.RUN Sandbox" workflow template streamlines the process of file analysis for security operations. By submitting a file download URL, users can leverage the ANY.RUN Sandbox to obtain a detailed JSON report that includes a verdict, Indicators of Compromise (IoCs), and a comprehensive enrichment summary. This workflow is ideal for enhancing application security operations, endpoint detection and response, and threat intelligence enrichment, providing actionable insights to bolster cybersecurity measures.
Use Cases
Application Security Operations , Endpoint Detection and Response (EDR) , Function , Threat Intelligence Enrichment
Workflow Breakdown
Accepts a file download URL as an input parameter.
The completed analysis report is retrieved and a sandbox summary is generated.
Indicators of Compromise (IPs, URLs, file hashes) are extracted from the analysis.
A final enrichment summary is produced, combining the report details with the extracted IoCs as the workflow output.
Vendors
Utils, ANY.RUN
Workflow Output
ANY.RUN Sandbox analysis report and verdict for the submitted file, and extracted IOCs.
