7.9. Analysis Report Analysis Procedure

7.9.1. Introduction

If a file is sent to a remote server (GBox or site intelligence), the analysis is performed by the remote server and it can be downloaded as a pdf report.
For more information on the contents of this report, see paragraph Results and analysis report.

Important

The SCORE field only makes sense for the pre-selected engine. It does not indicate that the scanned file is healthy but only that it is declared healthy by this engine.

To send the file to be analyzed to the remote server (such as the GBox) and retrieve the report, see Send file for external analysis to GCenter.


7.9.2. Prerequisites

  • User : member of Operator group


7.9.3. Opérations préliminaires


7.9.4. Procedure to analyse the `Error` Status

The `Error` status is indicated in part (9).

../_images/RAPPORT.PNG
  • Look at the reason for the error in the detailed text below.
    In this example, the error is on the Gmalcore engine which is unavailable.
    Here, the analysis is not significant.
  • Restart the Gmalcore engine on the GBox before restarting the analysis.


7.9.5. Procedure to analyse the `Clean` status

  • View the report.

../_images/RAPPORT-1.PNG
The "Clean" status is indicated in the visual signage (8).
This report is composed of:
  • A threat level (1) `Threat level`: here 0%
    This score is calculated from the analysis score returned by the different engines active of the GBox in the model at the time of detection
  • Part (2) `Analysers statuses`.
    This part lists the engines activated during the analysis and their results.
    This part indicates which analysis was done but in no case the result of the analysis:
    • `gnest analysis: Success`: Gnest engine analysis (3) was carried out

    • `grip analysis: Success`: Grip engine analysis (4) has been done

    • `goasm analysis: Success`: Goasm engine analysis (5) has been done

    • `gmalcore analysis: Success`: analysis of the Gmalcore engine (6) has been carried out

    • The summary of the analysis steps (7) which displays:

    • List of engines used: here gnest, grip, goasm and gmalcore
    • The result of the analysis for each of the engines: the check mark indicates that the analysis was executed correctly. A cross indicates that the run did not run properly.
      right side, the result of the analysis of the GBox: here the icon means Clean
  • Part (9) `Analysis` provides analysis information: hash, model and date

  • Part (10) `Sample` gives sample information: filename and sha256

../_images/RAPPORT-2.PNG

Note

Graph (11) is only available if Gnest is part of the model (the data needed for the graph is returned by this engine).

This graph (11) provides a visual on the dangerousness of the analyzed file:

  • The category of dangerousness is defined by axes (12) (13) and (14): titles and number of axes are given by the motors.

  • The level of dangerousness is given by concentric circles.

  • The central circle (17) indicates the healthy level.

  • Middle circle (16) indicates suspicious level.

  • Outer circle (15) indicates malicious level.

The synthesis for the file is read on the vertices of the represented form (18).
In the displayed example, the vertex (5) indicates that the file is:
  • Suspicious in line `execution` (13)

  • Healthy in axis `stealth` (12) and axis `antidebug` (14)

Then the report details the parts retailers analyses: Iocs (19), Static etc..
The details of these parts are given in the table below:

Part Title

Description

Is engine activated

`Analysis options`

Option values used for analysis

Grip and Gnest

`Iocs`

List of actions performed (files, registry, network, processes...)

GNEST

`Ttps`

TTPs analyse the functioning of a malicious actor, they describe how cyber attackers orchestrate, execute and manage operational attacks.
TTPs contextualize a threat. They reveal the steps or actions taken by malicious actors during data exfiltration for example.

GNEST

`Static`

Métadonnées

GRIP

`Overview`

File information (size, different hash, type...)

GNEST

`Heuristic`

List of engines (Entry#x) and name of the threat returned by the Gmalcore module (or n/a)

Gmalcore

`Shellcode`

Result of shellcode detection

GOASM

`Signatures`

List of yara signatures corresponding to the analyzed file

Gnest

`Process Tree`

Graphical representation of the process tree

Gnest


7.9.6. Procedure to analyse the `Malicious` status

../_images/RAPPORT-3.PNG
  • Read the report.
    The `Malicious` status is indicated in the visual signalétique (5).

This report is composed of:

  • A threat level (1) `Threat level`: here 100%
    This score is calculated from the analysis score returned by the different engines active of the GBox in the model at the time of detection
  • Part (2) `Analysers statuses`
    This part lists the engines activated during the analysis and their results.
    This part indicates which analysis was done but, in no case, the result of the analysis:
    • `gmalcore analysis: Success`: analysis of the Gmalcore engine (3) has been carried out;

    • The summary of the analysis steps (4) which displays:

    • List of engines used: here gmalcore only
    • The result of the analysis for each of the engines: the check mark indicates that the analysis was executed correctly. A cross indicates that the run did not run properly.
      Right side, the result of the analysis of the GBox: here the icon means `Malicious`
  • Part (6) `Analysis` provides analysis information: hash, model and date

  • Part (7) `Sample` gives sample information: filename and sha256

../_images/RAPPORT-4.PNG
Then the detailed report the parties retailers the analyses: Heuristic (8).
The details of these parts are given in the table below:

Part Title

Description

Is engine activated

`Analysis options`

Option values used for analysis

Grip and Gnest

`Iocs`

List of actions performed (files, registry, network, processes...)

GNEST

`Ttps`

TTPs analyse the functioning of a malicious actor, they describe how cyber attackers orchestrate, execute and manage operational attacks.
TTPs contextualize a threat. They reveal the steps or actions taken by malicious actors during data exfiltration for example.

GNEST

`Static`

Métadonnées

GRIP

`Overview`

File information (size, different hash, type...)

GNEST

`Heuristic`

List of engines (Entry#x) and name of the threat returned by the Gmalcore module (or n/a)

Gmalcore

`Shellcode`

Result of shellcode detection

GOASM

`Signatures`

List of yara signatures corresponding to the analyzed file

Gnest

`Process Tree`

Graphical representation of the process tree

Gnest

  • Analyze the results according to the score.

Astuce

A non-zero score is an indication of a threat.
A zero score only means that the current engine has not detected any threats.
Do not hesitate to restart the analysis with all the engines of the GBox.
  • Concatenate the GCenter and GBox report results.