View Detailed Malware Analysis of an EventView Detailed Malware Analysis of an Event
When viewing the list of individual events in a Malware Analysis scan in the Malware Analysis Events grid, you can double-click an event to view the detailed analysis results for the event.
View Malware Analysis Details for an EventView Malware Analysis Details for an Event
- Start an investigation in the Malware Analysis view.
The Malware Summary of Events is displayed, and includes four charts, including the Event Timeline.
- Do one of the following:
- To view all events in the Event Timeline, click the View Events button.
- Double-click data in the Meta Breakdown, Meta Treemap Chart, or Score Wheel.
The Events List is displayed.
- Double-click an event.
The Analysis Results for the event are displayed.
- (Optional) If you want to delete an event, select Actions > Delete Event.
- If you want to view a reconstruction of the network session, select Actions > View Network Session.
The session opens in the Navigate view > Event Reconstruction.
Pivot Network Analysis ResultsPivot Network Analysis Results
You can pivot the Network Analysis Results in several ways:
- Scroll down to the Network Analysis Results.
- Hover over a meta value and left-click.
The context menu is displayed.
- To view the selected meta value in the Navigate view, select Start Investigation and a time option.
- To view the selected meta value in a browser, select Open in Web Browser > Open in Google.
Use File Actions in the Static Analysis ResultsUse File Actions in the Static Analysis Results
- Scroll down to the Static Analysis Results.
- If you want to download a file, select the file name and either Download File (zipped) or Download File (natively) in the drop-down menu. It is safer to download a file in zipped format.
- If you want to mark the file as safe or unsafe in the hash list, select Filter File Hash and Mark hash as good or Mark hash as bad.
View Community Analysis Results DetailsView Community Analysis Results Details
The Community Analysis Results summarizes results from the community, identifying Indicators of Compromise that were flagged as a risk or identified as good.
In addition, this view lists the results from Installed AV Vendors and Not Installed AV Vendors. You can compare results of the installed AV vendors that were configured for the current Malware Analysis service versus Community results. You can also see results from a list of AV vendors that are not configured as installed for the current Malware Analysis service.
Each row of AV vendor results includes the shield icon to show whether the IOC was discovered by a Primary () or Secondary AV () vendor in the community, the name of the Installed or Not Installed vendor, and the name of malware or risk detected by the community and AV vendor. If the AV vendor did not detect a risk, -- Not detected -- is displayed instead of the name of the risk.
The Not Installed AV Vendors section is expandable to view all entries, but is collapsed by default to minimize the need to scroll. Clicking the + expands the list.
If no installed AV vendors have been configured for the current Malware Analysis service, the following message is displayed: No AV vendors were marked as installed. Please go to the Malware Analysis Service configuration page to identify installed AV vendors.
View Sandbox Analysis Results in the ThreatGRID User InterfaceView Sandbox Analysis Results in the ThreatGRID User Interface
If you have registered with ThreatGRID, you can view the Sandbox results directly in ThreatGRID.