Obtaining Sandbox Reports Using API

Sandbox Report API resources are only accessible to Sandbox subscribers.

Sandbox Report API resources allow you to get a Sandbox Detail Report for any file that was sent for analysis from any organization on Zscaler cloud. Zscaler stores Sandbox Detail Reports for all files that were detonated within Sandbox. Therefore, information such as the threat name, threat score, category, etc. is available within a report. However, the sample file itself and any potentially sensitive information such as screenshots or filenames are removed

To learn more, see About Sandbox.

Determining your Quota for the Sandbox Report API

The resource access quota for retrieving Sandbox Detail Reports is restricted to 3,000 requests per day, with a rate limit of 2/sec and 1,000/hour.

Getting the Sandbox Report API quota allows you to monitor your organization's used, unused, and allocated quota on a daily basis. To determine your quota, send a GET request to /sandbox/report/quota. For example, in Python:

conn.request("GET", "/api/v1/sandbox/report/quota", headers=headers)

To learn more, see Sandbox Report in the API Reference.

Getting a Full or Summary Sandbox Detail Report

To get a full (i.e., complete) or summary Sandbox Detail Report, send a GET request to /sandbox/report/{md5Hash} and specify whether the details parameter should be full or summary. For example, in Python, you would use the following code to get a summary report:

conn.request("GET", "/api/v1/sandbox/report/8350dED6D39DF158E51D6CFBE36FB012?details=summary", headers=headers)

GET /sandbox/report/{md5Hash} returns a report only if the MD5 file was analyzed previously. If a report for a requested MD5 does not exist, the request still counts against your quota.

To learn more about the API endpoint, see API Reference.

A Sandbox Detail Report always provides the following information:

  • Status: The summary status of the file analysis, which includes one of the following values:
    • COMPLETED: The file analysis was completed
    • NODYNAMIC: The file analysis was completed, but dynamic analysis was not performed
    • INPROGRESS: The file analysis is in progress
    • NOTFOUND: The MD5 hash was not found

For example (value highlighted in green):

        "Summary": {
            "Status": "COMPLETED",
            "Category": "SCRIPT",
            "FileType": "CMD",
            "Start Time": 1509567511,
            "Duration": 454557,
            "Analysis": "0",
            "Url": "",
            "TimeUnit": "ms",
            "StartTime": "Nov 1, 2017 1:18:31 PM"
        },
  • Category: The summary category of the analyzed file, which includes one of the following values:
    • SCRIPT
    • PDF
    • ANDROID
    • ARCHIVE
    • JAR
    • DOCS
    • FLASH
    • EXECS
    • OTHER
    • ANY

For example (value highlighted in green):

        "Summary": {
            "Status": "COMPLETED",
            "Category": "SCRIPT",
            "FileType": "CMD",
            "Start Time": 1509567511,
            "Duration": 454557,
            "Analysis": "0",
            "Url": "",
            "TimeUnit": "ms",
            "StartTime": "Nov 1, 2017 1:18:31 PM"
        },
  • Type: The classification type of the analyzed file, which includes one of the following values:
    • MALICIOUS
    • SUSPICIOUS
    • BENIGN

For example (value highlighted in green):

        "Classification": {
            "Type": "MALICIOUS",
            "Category": "MALWARE_BOTNET",
            "Score": 86,
            "Max Score": 100,
            "DetectedMalware": ""
        },
  • Category: The classification category of the analyzed file, which includes one of the following values:
    • BENIGN
    • SUSPICIOUS
    • ADWARE
    • MALWARE_BOTNET
    • ANONYMIZER_P2P

For example (value highlighted in green):

        "Classification": {
            "Type": "MALICIOUS",
            "Category": "MALWARE_BOTNET",
            "Score": 86,
            "Max Score": 100,
            "DetectedMalware": ""
        },

A summary Sandbox Detail Report only includes Summary, Classification, and FileProperties information.

  • {
        "Summary": {
            "Summary": {
                "Status": "COMPLETED",
                "Category": "EXECS",
                "FileType": "DLL",
                "StartTime": 1522111841,
                "Duration": 481690
            },
            "Classification": {
                "Type": "MALICIOUS",
                "Category": "MALWARE_BOTNET",
                "Score": 82,
                "DetectedMalware": "Win32/TrojanDownloader.Banload.TNJ trojan"
            },
            "FileProperties": {
                "FileType": "DLL",
                "FileSize": 2358272,
                "MD5": "b3b13c2fe5710507612106cb11ceced3",
                "SHA1": "6f30404f8b30812758acc06455bc95348c86f9f2",
                "Sha256": "c77ab4c60b73c8f8135d54162813ab7c63432058f17ff00754d5fd547c22db76",
                "Issuer": "",
                "DigitalCerificate": "",
                "SSDeep": "49152:mQU0HSp/RcGuBLe/PESBbFVZ86MfBWPvGZxnBGVV3NcKRLFcTOJP:mQUn6LsPQp6vkoiKt",
                "RootCA": ""
            }
        }
    }
    
    Close

A full Sandbox Detail Report includes the same information as in a summary report, and also includes System Summary, Networking, and other information specific to the analyzed file.

  • {
        "Full Details": {
            "Summary": {
                "Status": "COMPLETED",
                "Category": "SCRIPT",
                "FileType": "CMD",
                "Start Time": 1509567511,
                "Duration": 454557,
                "Analysis": "0",
                "Url": "",
                "TimeUnit": "ms",
                "StartTime": "Nov 1, 2017 1:18:31 PM"
            },
            "Classification": {
                "Type": "MALICIOUS",
                "Category": "MALWARE_BOTNET",
                "Score": 86,
                "Max Score": 100,
                "DetectedMalware": ""
            },
            "File Properties": {
                "File Type": "CMD",
                "File Size": 9810,
                "MD5": "8350ded6d39df158e51d6cfbe36fb012",
                "SHA1": "f4dd1d176975c70ba8963ebc654a78a6e345cfb6",
                "Sha256": "aff2d40828597fbf482753bec73cc9fc2714484262258875cc23c7d5a7372cee",
                "Issuer": "",
                "Digital Cerificate": "",
                "SSDeep": "192:+cgNT7Zj4tvl2Drc+gEakjqBT1W431lXXH1TR8J:InZjevl2Drc+gEakmBT44rXVR8J",
                "RootCA": ""
            },
            "System Summary": [
                {
                    "Risk": "LOW",
                    "Signature": "Allocates memory within range which is reserved for system DLLs",
                    "Signature Sources": [
                        "",
                        "76E70000 page execute and read and write",
                        "76E70000 page execute and read and write",
                        "76E70000 page execute and read and write",
                        "76E70000 page execute and read and write",
                        "76F90000 page execute and read and write",
                        "76F90000 page execute and read and write",
                        "76F90000 page execute and read and write",
                        "76F90000 page execute and read and write"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Classification label",
                    "Signature Sources": [
                        "",
                        "mal68.winCMD@53/26@0/0"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Creates files inside the user directory",
                    "Signature Sources": [
                        "",
                        "C:\\Users\\win_7_64bit\\Desktop\\WlanTraces"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Found command line output",
                    "Signature Sources": [
                        ""
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Queries the cryptographic machine GUID",
                    "Signature Sources": [
                        "",
                        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography MachineGuid"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Reads software policies",
                    "Signature Sources": [
                        "",
                        "HKEY_USERS\\Software\\Policies\\Microsoft\\Windows\\Safer\\CodeIdentifiers"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Sample sleeps for a long time",
                    "Signature Sources": [
                        ""
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Spawns processes",
                    "Signature Sources": [
                        "",
                        "C:\\Windows\\SysWOW64\\cmd.exe ",
                        "C:\\Windows\\SysWOW64\\cmd.exe ",
                        "C:\\Windows\\SysWOW64\\cmd.exe ",
                        "C:\\Windows\\SysWOW64\\find.exe ",
                        "C:\\Windows\\SysWOW64\\find.exe ",
                        "C:\\Windows\\SysWOW64\\logman.exe ",
                        "C:\\Windows\\SysWOW64\\netsh.exe ",
                        "C:\\Windows\\SysWOW64\\whoami.exe "
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Uses an in-process (OLE) Automation server",
                    "Signature Sources": [
                        "",
                        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{03837525-098B-11D8-9414-505054503030}\\InprocServer32"
                    ]
                }
            ],
            "Networking": [
                {
                    "Risk": "MODERATE",
                    "Signature": "Uses ipconfig to modify the Windows network settings",
                    "Signature Sources": [
                        "",
                        "C:\\Windows\\SysWOW64\\ipconfig.exe "
                    ]
                },
                {
                    "Risk": "HIGH",
                    "Signature": "Uses netsh to modify the Windows network and firewall settings",
                    "Signature Sources": [
                        "",
                        "C:\\Windows\\SysWOW64\\netsh.exe "
                    ]
                }
            ],
            "Security Bypass": [
                {
                    "Risk": "LOW",
                    "Signature": "Checks for kernel debuggers",
                    "Signature Sources": [
                        "",
                        "KernelDebuggerInformation"
                    ]
                },
                {
                    "Risk": "LOW",
                    "Signature": "Executes massive amount of sleeps in a loop",
                    "Signature Sources": [
                        "",
                        "-60000ms >= -60000ms",
                        "-60000ms >= -60000ms",
                        "-60000ms >= -60000ms",
                        "-60000ms >= -60000ms",
                        "-60000ms >= -60000ms"
                    ]
                },
                {
                    "Risk": "MODERATE",
                    "Signature": "Enables debug privileges",
                    "Signature Sources": [
                        "",
                        "Debug"
                    ]
                },
                {
                    "Risk": "MODERATE",
                    "Signature": "Sample sleeps for a long time (installer files shows these property).",
                    "Signature Sources": [
                        ""
                    ]
                }
            ],
            "Stealth": [
                {
                    "Risk": "LOW",
                    "Signature": "Disables application error messages",
                    "Signature Sources": [
                        "",
                        "NOOPENFILEERRORBOX",
                        "NOOPENFILEERRORBOX",
                        "NOOPENFILEERRORBOX",
                        "NOOPENFILEERRORBOX"
                    ]
                },
                {
                    "Risk": "MODERATE",
                    "Signature": "Very long cmdline option found",
                    "Signature Sources": [
                        "",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  create trace autosession\\IntelNetwfw02 -p  0xffffffff 255 -f bincirc -max 250 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\IntelNetwfw02_WIN_7_64BIT-PC_11-01-2017_0825.etl",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  create trace autosession\\bcrmwlan -p {CEA4623F-AA31-4286-B3A5-797EF8A75C17} 0xffffffff 255 -f bincirc -max 250 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\BCRMwlan_WIN_7_64BIT-PC_11-01-2",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  create trace autosession\\mwls97w8arm -p {BFA91C93-9E18-497C-971B-490D06089E97} 0x1 255 -f bincirc -max 250 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\Marvell_WIN_7_64BIT-PC_11-01-2017_0",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  create trace autosession\\qcwlan -p {BB6F5B93-635C-47BE-816F-E895E77064A8} 0xffff 18 -f bincirc -max 250 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\QCwlan_WIN_7_64BIT-PC_11-01-2017_0825.",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  start bcrmwlan -p {CEA4623F-AA31-4286-B3A5-797EF8A75C17} 0xffffffff 255 -f bincirc -max 150 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\BCRMwlan_WIN_7_64BIT-PC_11-01-2017_0825.etl -ets",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  start mwls97w8arm -p {BFA91C93-9E18-497C-971B-490D06089E97} 0x1 255 -f bincirc -max 150 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\Marvell_WIN_7_64BIT-PC_11-01-2017_0825.etl -ets",
                        "C:\\Windows\\SysWOW64\\logman.exe logman  start qcwlan -p {BB6F5B93-635C-47BE-816F-E895E77064A8} 0xffff 18 -f bincirc -max 150 -o C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\QCwlan_WIN_7_64BIT-PC_11-01-2017_0825.etl -ets",
                        "C:\\Windows\\SysWOW64\\netsh.exe netsh  trace sta wireless_dbg provider={21ba7b61-05f8-41f1-9048-c09493dcfe38} 0xff globallevel=0xff persistent=yes trace=C:\\Users\\win_7_64bit\\Desktop\\WlanTraces\\WIN_7_64BIT-PC-11-01-2017_0825\\wlan_WIN_7_64BIT-PC_11-01-2017_08"
                    ]
                }
            ],
            "Persistence": [
                {
                    "Risk": "MODERATE",
                    "Signature": "Creates or modifies Windows services",
                    "Signature Sources": [
                        "",
                        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\IKEEXT\\Parameters"
                    ]
                },
                {
                    "Risk": "HIGH",
                    "Signature": "Modifies security policies related information",
                    "Signature Sources": [
                        "",
                        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\Kerberos\\Parameters KerbDebugLevel"
                    ]
                },
                {
                    "Risk": "HIGH",
                    "Signature": "Uses sc.exe to modify the status of services",
                    "Signature Sources": [
                        "",
                        "C:\\Windows\\SysWOW64\\sc.exe "
                    ]
                }
            ]
        }
    }
    Close