Skip to main content

Workflow Template: Enrich Case with URL Analysis in ANY.RUN Sandbox

Detonate a URL observable from a Torq Case in ANY.RUN Sandbox and enrich the case with verdict, IoCs, HTML report, and notes.

The "Enrich Case with URL Analysis in ANY.RUN Sandbox" workflow template is designed to enhance case management and threat intelligence enrichment by automating the analysis of URLs. Triggered from a Torq Case, it submits URLs to the ANY.RUN Sandbox for analysis, retrieves detailed reports, and extracts Indicators of Compromise (IoCs). The workflow updates the case with threat levels, scores, and behavioral tags, and attaches relevant reports and IoCs, streamlining the process of handling phishing and web security alerts.

Use Cases

Case Management , Phishing , Remediate Web Security Alerts , Threat Intelligence Enrichment

Workflow Breakdown

  1. Triggered from a Torq Case via "Run a workflow"; extracts case observables and validates that a URL is present.

  2. Submits the URL to ANY.RUN Sandbox, attaches the live sandbox link to the case, and enters a polling loop until analysis completes.

  3. Retrieves the completed report and extracts IoCs (IPs, URLs, file hashes) from the analysis output.

  4. Updates the matching observable's reputation, attaches a case note with threat level, scores, and behavioral tags, and updates observable enrichment.

  5. If the verdict is malicious or suspicious, runs parallel actions to attach the HTML report and (when IoCs exist) attach an IOC.csv to the case.

Vendors

Utils, ANY.RUN, Torq Cases

Workflow Output

Enrichment summary containing the analysis report details and extracted IoCs.

Did this answer your question?