Analyze Malicious Files in a Sandboxing Environment with Cyware’s Intel Exchange (CTIX)
Sandboxing • Apr 3, 2023
We use cookies to improve your experience. Do you accept?
Sandboxing • Apr 3, 2023
Sandboxing provides a safe environment where security teams can detonate malicious programs, files, or URLs to analyze and observe their behavior. With the release of Intel Exchange (CTIX) version 3.3.2, Cyware has enabled security teams to perform a detailed analysis of malware and gather advanced threat intelligence by integrating with Joe Sandbox.
The integration of Intel Exchange and Joe Security Sandbox enables security analysts to analyze malicious files and URLs on Windows, macOS, Android, and Linux environments. By enabling in-depth analysis, it significantly enhances the threat detection rate and minimizes threat evasion. Let’s find out how it works!
By integrating with a sandbox tool, Intel Exchange enables the analysis of potentially malicious files or URLs in an isolated environment hosted by the sandbox provider. This allows safe threat analysis without putting host devices or networks to risk.
If a potential threat is detected, security teams can analyze the threat in Intel Exchange and automatically take actions on the analyzed data in third-party detection and response tools, such as SIEM, EDR, UEBA, etc.
The Intel Exchange Sandboxing use cases include
The Intel Exchange Sandbox integration allows security teams to upload a malicious file or URL, which is executed in the chosen environment for malware analysis. This helps them to automatically harvest malicious IOCs detected during detonation and take action on them for further blocking/detection. After the analysis is performed by the sandbox tool, security teams can view the detailed malware analysis report.
The integration facilitates verdict mapping, enabling the results of files or URLs analyzed in Joe Security Sandbox to be mapped to Intel Exchange. This feature empowers security teams to determine if files and URLs are malicious, non-malicious, or suspicious effectively.
Once a file or URL is successfully analyzed, security teams can create intel in Intel Exchange using the data identified in the sandbox malware analysis report. The intel can further be enriched, scored, and directly fed into SIEMs.
Security teams can determine potentially malicious IOCs and better respond to the threats. After the analysis, Intel Exchange automatically feeds these IOCs into their SIEM tool for threat hunting and automated actioning.
Let’s learn how security teams are benefited from this new integration.
Intel Exchange Sandboxing is designed to prevent threats from intruding on your networks, helping you boost your incident response process. you'll be at the forefront of real-time threat analysis, expertly triaging incidents, uncovering elusive IOCs, and unlocking valuable insights for proactive threat hunting.
To learn more about this integration, book a free demo today.