Skip to content

t0x01/any.run

 
 

Repository files navigation

ANY.RUN

Publisher: ANYRUN FZCO
Connector Version: 1.1.0
Product Vendor: ANYRUN FZCO
Product Name: ANY.RUN
Product Version Supported (regex): ".*"
Minimum Product Version: 6.2.0.355

This app enables you to detonate files and URLs, and perform investigative actions, using the ANY.RUN interactive online malware sandbox service, thereby giving you automated analysis and advanced threat detection through an agentless sandbox

Authentication

This connector requires an API key to authenticate with the ANY.RUN services. You can generate the key at your ANY.RUN Profile.
Official API documentation can be found here.

License requirements

This connector is intended for customers with a 'Hunter' or 'Enterprise' subscription plans mainly, since some features provided by the connector are available with the mentioned plans only. Information about subscription plans and features available with them can be found here.

Dependencies

This connector comes with some additional python 3 libraries, that it depends on, including:

- aiosignal-1.3.1 (Apache License 2.0, Copyright 2013-2019 Nikolay Kim and Andrew Svetlov)
- async_timeout-4.0.3 (Apache License 2.0, Copyright 2016-2020 aio-libs collaboration)
- attrs-23.2.0 (MIT License, Copyright (c) 2015 Hynek Schlawack and the attrs contributors)
- multidict-6.0.5 (Apache License 2.0, Copyright 2016 Andrew Svetlov and aio-libs contributors)
- yarl-1.9.4 (Apache License 2.0, Copyright 2016-2021, Andrew Svetlov and aio-libs team)
- frozenlist-1.4.1 (Apache License 2.0, Copyright 2013-2019 Nikolay Kim and Andrew Svetlov)
- aiohttp-3.10.2 (Apache License 2.0, Copyright aio-libs contributors)
- anyrun_py-0.1.1

Configuration Variables

The below configuration variables are required for this Connector to operate. These variables are specified when configuring a ANY.RUN asset in SOAR.

VARIABLE REQUIRED TYPE DESCRIPTION
anyrun_server required string ANY.RUN base URL (e.g. https://api.any.run)
anyrun_api_key required password API Key used for API authentication
anyrun_timeout required numeric Number of seconds to wait for a request to timeout

Supported Actions

test connectivity - Validate the asset configuration for connectivity using supplied configuration
url reputation - Get reports of a specific URL analysis
file reputation - Get reports of a specific file analysis by that file's hash
domain reputation - Get reports of analyses, that involve specific domain
ip reputation - Get reports of analyses, that involve specific IP
get report - Get report for a submission
get iocs - Get list of IoCs for a submission
detonate url - Detonate a URL
detonate file - Detonate a file from Vault
get intelligence - Threat Intelligence IoC Lookup

action: 'test connectivity'

Validate the asset configuration for connectivity using supplied configuration

Type: test
Read only: True

Action Parameters

No parameters are required for this action

Action Output

No Output

action: 'url reputation'

Get reports of a specific URL analysis

Type: investigate
Read only: True

This action requests a list of already completed reports of a URL analysis. Option search_in_public_tasks enables search in public submissions, which requires ANY.RUN TI License to work, and is disabled by default. By default, only 100 recent submissions from your own submission history are used for search.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
url required URL (Size range: 2-256) string url
search_in_public_tasks optional Option for searching in public tasks (requires TI license) boolean

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.url string url
action_result.parameter.search_in_public_tasks boolean
action_result.data.*.tasks.*.uuid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.mainObject.name string
action_result.data.*.tasks.*.verdict string No threats detected Suspicious activity Malicious activity
action_result.data.*.tasks.*.related string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.date string 2024-01-01T00:00:00.000Z
action_result.data.*.tasks.*.file string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89
action_result.data.*.tasks.*.misp string https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp
action_result.data.*.tasks.*.pcap string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap
action_result.data.*.tasks.*.mainObject.hashes.md5 string hash md5
action_result.data.*.tasks.*.mainObject.hashes.sha1 string hash sha1
action_result.data.*.tasks.*.mainObject.hashes.sha256 string hash sha256
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'file reputation'

Get reports of a specific file analysis by that file's hash

Type: investigate
Read only: True

This action requests a list of already completed reports of a file analysis. Option search_in_public_tasks enables search in public submissions, which requires ANY.RUN TI License to work, and is disabled by default. By default, only 100 recent submissions from your own submission history are used for search.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
hash required File hash ('MD5', 'SHA1', 'SHA256') (Size range: 2-256) string hash md5 sha1 sha256
search_in_public_tasks optional Option for searching in public tasks (requires TI license) boolean

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.hash string hash md5 sha1 sha256
action_result.parameter.search_in_public_tasks boolean
action_result.data.*.tasks.*.uuid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.mainObject.name string
action_result.data.*.tasks.*.verdict string No threats detected Suspicious activity Malicious activity
action_result.data.*.tasks.*.related string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.date string 2024-01-01T00:00:00.000Z
action_result.data.*.tasks.*.file string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89
action_result.data.*.tasks.*.misp string https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp
action_result.data.*.tasks.*.pcap string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap
action_result.data.*.tasks.*.mainObject.hashes.md5 string hash md5
action_result.data.*.tasks.*.mainObject.hashes.sha1 string hash sha1
action_result.data.*.tasks.*.mainObject.hashes.sha256 string hash sha256
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'domain reputation'

Get reports of analyses, that involve specific domain

Type: investigate
Read only: True

This action requests a list of already completed reports of analyses, where requested domain was involved. This action requires ANY.RUN TI License.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
domainname required Domain name (Size range: 2-256) string domain

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.domainname string domain
action_result.data.*.tasks.*.uuid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.mainObject.name string
action_result.data.*.tasks.*.verdict string No threats detected Suspicious activity Malicious activity
action_result.data.*.tasks.*.related string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.date string 2024-01-01T00:00:00.000Z
action_result.data.*.tasks.*.file string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89
action_result.data.*.tasks.*.misp string https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp
action_result.data.*.tasks.*.pcap string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap
action_result.data.*.tasks.*.mainObject.hashes.md5 string hash md5
action_result.data.*.tasks.*.mainObject.hashes.sha1 string hash sha1
action_result.data.*.tasks.*.mainObject.hashes.sha256 string hash sha256
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'ip reputation'

Get reports of analyses, that involve specific IP

Type: investigate
Read only: True

This action requests a list of already completed reports of analyses, where requested IP was involved. This action requires ANY.RUN TI License.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP (Size range: 2-256) string ip

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip
action_result.data.*.tasks.*.uuid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.mainObject.name string
action_result.data.*.tasks.*.verdict string No threats detected Suspicious activity Malicious activity
action_result.data.*.tasks.*.related string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.tasks.*.date string 2024-01-01T00:00:00.000Z
action_result.data.*.tasks.*.file string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89
action_result.data.*.tasks.*.misp string https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp
action_result.data.*.tasks.*.pcap string https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap
action_result.data.*.tasks.*.mainObject.hashes.md5 string hash md5
action_result.data.*.tasks.*.mainObject.hashes.sha1 string hash sha1
action_result.data.*.tasks.*.mainObject.hashes.sha256 string hash sha256
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'get report'

Get report for a submission

Type: investigate
Read only: True

This action requires a submission TaskID.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
taskid required ANY.RUN task UUID string anyrun task id

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.taskid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.analysis.permanentUrl string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.analysis.reports.ioc string https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/ioc/json
action_result.data.*.analysis.reports.graph string https://content.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/graph
action_result.data.*.analysis.scores.verdict.threatLevelText string No threats detected Suspicious activity Malicious activity
action_result.data.*.analysis.scores.verdict.threatLevel numeric 0 1 2
action_result.data.*.analysis.scores.verdict.score numeric 100
action_result.data.*.analysis.scores.specs.knownThreat string false true
action_result.data.*.analysis.content.mainObject.type string file download url
action_result.data.*.analysis.content.mainObject.url string
action_result.data.*.analysis.content.mainObject.filename string
action_result.data.*.analysis.content.mainObject.info.file string
action_result.data.*.analysis.content.mainObject.info.mime string
action_result.data.*.analysis.content.mainObject.hashes.sha256 string hash sha256
action_result.data.*.analysis.content.mainObject.hashes.sha1 string hash sha1
action_result.data.*.analysis.content.mainObject.hashes.md5 string hash md5
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'get iocs'

Get list of IoCs for a submission

Type: investigate
Read only: True

This action requires a submission TaskID.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
taskid required ANY.RUN task UUID string anyrun task id

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.taskid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.ioc.*.ioc string
action_result.data.*.ioc.*.type string md5 sha1 sha256 domain ip url
action_result.data.*.ioc.*.category string
action_result.data.*.ioc.*.reputation numeric 0 1 2
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'detonate url'

Detonate a URL

Type: investigate
Read only: True

This action requires a URL for ANY.RUN service to analyse. All other parameters are optional - for more information about them refer to official documentation (https://any.run/api-documentation/).

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
obj_url required URL to detonate (Size range: 5-512) string url
obj_type optional Type of new task (Default: url) string
os optional Operation System (Default: Windows10x64_complete) string
env_locale optional Operation system's language (Default: en-US) string
opt_network_connect optional Network connection state boolean
opt_network_fakenet optional FakeNet feature status boolean
opt_network_tor optional TOR using boolean
opt_network_geo optional Geo location option (Default: fastest) string
opt_network_mitm optional HTTPS MITM proxy option boolean
opt_network_residential_proxy optional Residential proxy using boolean
opt_network_residential_proxy_geo optional Residential proxy geo location option (Default: fastest) string
opt_privacy_type optional Privacy settings (Default: bylink) string
opt_timeout optional Timeout option (seconds) (Default: 60) (Size range: 10-1200) numeric
opt_automated_interactivity optional Automated Interactivity (ML) option boolean
obj_ext_startfolder optional Start object from (Default: temp) string
obj_ext_cmd optional Optional command line (Size range: 2-256) string
obj_ext_browser optional Browser name (Default: Google Chrome) string
obj_ext_useragent optional User agent (Size range: 2-256) string
obj_ext_extension optional Change extension to valid boolean
opt_privacy_hidesource optional Option for hiding of source URL boolean

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.obj_url string url
action_result.parameter.obj_type string url download
action_result.parameter.os string
action_result.parameter.env_locale string
action_result.parameter.opt_network_connect boolean
action_result.parameter.opt_network_fakenet boolean
action_result.parameter.opt_network_tor boolean
action_result.parameter.opt_network_geo string
action_result.parameter.opt_network_mitm boolean
action_result.parameter.opt_network_residential_proxy boolean
action_result.parameter.opt_network_residential_proxy_geo string
action_result.parameter.opt_privacy_type string
action_result.parameter.opt_timeout numeric
action_result.parameter.opt_automated_interactivity boolean
action_result.parameter.obj_ext_startfolder string
action_result.parameter.obj_ext_cmd string
action_result.parameter.obj_ext_browser string
action_result.parameter.obj_ext_useragent string
action_result.parameter.obj_ext_extension boolean
action_result.parameter.opt_privacy_hidesource boolean
action_result.data.*.taskid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.permanentUrl string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'detonate file'

Detonate a file from Vault

Type: investigate
Read only: True

This action requires a vauld ID of a file for ANY.RUN service to analyse. All other parameters are optional - for more information about them refer to official documentation (https://any.run/api-documentation/).

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
vault_id required Vault ID of a file to detonate string vault id
os optional Operation System (Default: Windows10x64_complete) string
env_locale optional Operation system's language (Default: en-US) string
opt_network_connect optional Network connection state boolean
opt_network_fakenet optional FakeNet feature status boolean
opt_network_tor optional TOR using boolean
opt_network_geo optional Geo location option (Default: fastest) string
opt_network_mitm optional HTTPS MITM proxy option boolean
opt_network_residential_proxy optional Residential proxy using boolean
opt_network_residential_proxy_geo optional Residential proxy geo location option (Default: fastest) string
opt_privacy_type optional Privacy settings (Default: bylink) string
opt_timeout optional Timeout option (seconds) (Default: 60) (Size range: 10-660) numeric
opt_automated_interactivity optional Automated Interactivity (ML) option boolean
obj_ext_startfolder optional Start object from (Default: temp) string
obj_ext_cmd optional Optional command line (Size range: 2-256) string
obj_ext_elevateprompt optional Encounter UAC prompts boolean
auto_confirm_uac optional Auto confirm Windows UAC requests. Not applicable for Linux , use run_as_root instead boolean
run_as_root optional Run file with superuser privileges. Not applicable for Windows, use auto_confirm_uac instead. Used only for file type boolean
obj_ext_extension optional Change extension to valid boolean

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.vault_id string vault id
action_result.parameter.os string
action_result.parameter.env_locale string
action_result.parameter.opt_network_connect boolean
action_result.parameter.opt_network_fakenet boolean
action_result.parameter.opt_network_tor boolean
action_result.parameter.opt_network_geo string
action_result.parameter.opt_network_mitm boolean
action_result.parameter.opt_network_residential_proxy boolean
action_result.parameter.opt_network_residential_proxy_geo string
action_result.parameter.opt_privacy_type string
action_result.parameter.opt_timeout numeric
action_result.parameter.opt_automated_interactivity boolean
action_result.parameter.obj_ext_startfolder string
action_result.parameter.obj_ext_cmd string
action_result.parameter.obj_ext_elevateprompt boolean
action_result.parameter.auto_confirm_uac boolean
action_result.parameter.run_as_root boolean
action_result.parameter.obj_ext_extension boolean
action_result.data.*.taskid string anyrun task id 0cf223f2-530e-4a50-b68f-563045268648
action_result.data.*.permanentUrl string https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'get intelligence'

Threat Intelligence IoC Lookup

Type: investigate
Read only: True

Perform investigative actions by using the ANY.RUN Threat Intelligence Portal API method. This action requires ANY.RUN TI License. For more information about available parameters refer to official documentation (https://any.run/api-documentation/).

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
sha256 optional Sha256 (Size range: 2-256) string hash sha256
sha1 optional Sha1 (Size range: 2-256) string hash sha1
md5 optional MD5 (Size range: 2-256) string hash md5
threatname optional Name of threat (Size range: 2-256) string
threatlevel optional Threat level (Default: ) string
tasktype optional Task run type (Default: ) string
submissioncountry optional Submission country (Size range: 2-256) string
os optional Operation system (Default: - not used) string
ossoftwareset optional Operation system software (Default: - not used) string
osbitversion optional Operation system bitness (Default: - not used) numeric
registrykey optional Registry key (Size range: 2-256) string
registryname optional Registry name (Size range: 2-256) string
registryvalue optional Registry value (Size range: 2-256) string
moduleimagepath optional Module image path (Size range: 2-256) string file path
rulethreatlevel optional Rule threat level (Default: - not used) string
rulename optional Rule name (Size range: 2-256) string
mitre optional MITRE (Size range: 2-256) string
imagepath optional Process image path (Size range: 2-256) string file path
commandline optional Command line (Size range: 2-256) string process name
injectedflag optional Injected flag (Default: - not used) string
destinationip optional Destination ip (Size range: 2-256) string ip
destinationport optional Destination port (Default: - not used) (Size range: 1-65535) numeric port
destinationipasn optional Destination IPASN (Size range: 2-256) string
destinationipgeo optional Destination IP Geo (Size range: 2-256) string
domainname optional Domain name (Size range: 2-256) string domain
filename optional File name (Size range: 2-256) string file name
suricataclass optional Suricata class (Default: - not used) string
suricatamessage optional Suricata message (Size range: 2-256) string
suricatathreatlevel optional Suricata threat level (Default: - not used) string
suricataid optional Suricata ID (Size range: 2-256) string
url optional URL (Size range: 2-256) string url
httprequestcontenttype optional HTTP request content type (Size range: 2-256) string
httpresponsecontenttype optional HTTP response content type (Size range: 2-256) string
httprequestfiletype optional HTTP request file type (Size range: 2-256) string
httpresponsefiletype optional HTTP response file type (Size range: 2-256) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.sha256 string hash sha256
action_result.parameter.sha1 string hash sha1
action_result.parameter.md5 string hash md5
action_result.parameter.threatname string
action_result.parameter.threatlevel string
action_result.parameter.tasktype string
action_result.parameter.submissioncountry string
action_result.parameter.os string
action_result.parameter.ossoftwareset string
action_result.parameter.osbitversion numeric
action_result.parameter.registrykey string
action_result.parameter.registryname string
action_result.parameter.registryvalue string
action_result.parameter.moduleimagepath string file path
action_result.parameter.rulethreatlevel string
action_result.parameter.rulename string
action_result.parameter.mitre string
action_result.parameter.imagepath string file path
action_result.parameter.commandline string
action_result.parameter.injectedflag string
action_result.parameter.destinationip string ip
action_result.parameter.destinationport numeric port
action_result.parameter.destinationipasn string
action_result.parameter.destinationipgeo string
action_result.parameter.domainname string domain
action_result.parameter.filename string file name
action_result.parameter.suricataclass string
action_result.parameter.suricatamessage string
action_result.parameter.suricatathreatlevel string
action_result.parameter.suricataid string
action_result.parameter.url string url
action_result.parameter.httprequestcontenttype string
action_result.parameter.httpresponsecontenttype string
action_result.parameter.httprequestfiletype string
action_result.parameter.httpresponsefiletype string
action_result.data.*.summary.threatLevel string
action_result.data.*.summary.detectedType string
action_result.data.*.summary.lastSeen string
action_result.summary.*.Type string
action_result.summary.*.Count numeric
action_result.summary.*.str string
action_result.status string success failed
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%