ANY.RUN, a well-known interactive malware analysis platform, has announced Smart Content Analysis, an enhancement to its Automated Interactivity feature. This new mechanism is designed to automatically analyze and detonate complex malware and phishing attacks, providing investigators with quicker and more detailed insights into malicious behavior.
Speed Optimization for Investigations: Accelerates the analysis workflow, saving time for cybersecurity professionals by streamlining the detonation process.
Automated Detonation of Advanced Threats: It enables automated processing of sophisticated malware and phishing campaigns, reducing the need for manual intervention.
Enhanced Insight Generation: Delivers in-depth behavioral analysis, highlighting malicious actions and patterns for faster decision-making.
About Smart Content Analysis
ANY.RUN’s Smart Content Analysis is an advanced feature within its Automated Interactivity suite, designed to autonomously execute multi-stage cyber attacks for comprehensive analysis. This mechanism operates through a structured three-step process:
- Content Identification: The system scans uploaded files to detect critical components, such as URLs and email attachments.
- Content Extraction: It extracts elements essential for advancing the attack, including URLs embedded within QR codes or those modified by security filters.
- Simulated User Interactions: The platform engages with the malicious content in a controlled environment by opening URLs in a browser or executing payloads found in email archive attachments to observe their behavior.
Detonating a Multi-Stage Attack with Automated Interactivity
With this new upgrade, ANY.RUN’s sandbox can automatically execute the following types of content found at different stages of complex cyber attacks:
- URLs inside QR codes
- Modified links
- Multi-stage redirects
- Email attachments
- Payloads with archives
Users interested can get a 14-day free trial of ANY.RUN to explore Automated Interactivity and other PRO features
Consider the following multi-stage phishing attack analyzed with Automated Interactivity.
The system automatically opens the .eml file submitted by the user via Outlook, detects a PDF attachment, and scans its contents.
Inside the PDF, it identifies a QR code, instantly extracts the embedded URL, and opens it in a browser.
When faced with a CAPTCHA challenge, commonly used to evade detection, the feature successfully solves it and moves on to the next stage of the attack.
Eventually, it successfully reaches the final phishing page, not only ensuring complete detection of the attack, but also providing additional context on the threat at hand.
Adaptive to New Threats
ANY.RUN’s Smart Content Analysis is built to adapt to the changing threat landscape. With regular attack scenario updates from the ANY.RUN threat research team, the system remains aligned with emerging attack methods, allowing it to handle even the latest and most evasive threats.
Exploring Smart Content Analysis
Automated Interactivity helps security professionals streamline and improve their threat investigations:
- Less manual effort: No more wasted clicks. Let the sandbox handle repetitive actions so you can focus on the bigger picture.
- Faster, deeper insights: Go beyond surface detections with simulations that bring hidden threat layers to light.
- Speedy analysis: Accelerate your analysis with automation that moves as fast as you do, from simple phishing links to layered attack chains.
Users can request a 14-day free trial of ANY.RUN’s Interactive Sandbox to try Automated Interactivity for free.
𝐀𝐛𝐨𝐮𝐭 𝐀𝐍𝐘.𝐑𝐔𝐍
ANY.RUN is a widely utilized interactive malware analysis platform, serving over 500,000 cybersecurity professionals globally. It offers real-time analysis capabilities for both Windows and Linux environments, enabling users to interact with virtual machines to observe and influence malware behavior directly.
To enhance incident response and threat intelligence, ANY.RUN provides several advanced tools:
Threat Intelligence Feeds: ANY.RUN offers real-time streams of the latest indicators of compromise (IOCs), including malicious IPs, URLs, and domains, which can be integrated into existing security systems to bolster defenses against emerging threats.
TI Lookup: This feature allows analysts to access a comprehensive database of threat indicators, facilitating quick identification and contextual understanding of various cyber threats.
YARA Search: Users can perform YARA searches against real threat data collected by a vast community of researchers, obtaining search results swiftly with real-world malware usage examples.
Users can connect through social media: X, LinkedIn.
Contact
ANYRUN FZCO
pr@any.run
+1 657-366-5050