Path: blob/master/tutorials-and-examples/example-notebooks/VirusTotal File Behavior Explorer - MS and Sysmon detonation.ipynb
3253 views
VirusTotal Behavior with Microsoft Sysmon Detonation
This notebook uses the VirusTotal API to retrieve detonation information for a file ID (the SHA256 hash of the file).
There are 5 main sections:
Setup
Retrieve basic information about the file ID
Retrieve and browse denotation data for the file
Build and view the process tree for the suspect behavior
Generate KQL filter clauses for subsets of the data to use in Microsoft Sentinel queries.
VirusTotal Basic File Data
This section retrieves basic VT data for a file hash.
Running the following cell will show a form in which you can enter a file ID (the SHA256 hash of the file).
Clicking the Lookup button will search VirusTotal for a match and populate the summary details in the form. Selecting a result attribute (on the left) shows the data for that attribute.
The file ID entered here is used in subsequent parts of the notebook to download the behavior information.
Get Microsoft Detonation Details from Virus Total
This section tries to retrieve detonation behavior details from the file ID selected in the previous cell.
The output is split into groups of related data items such as file operations, registry operations, etc. Within each tabbed group, there are individual data sets in their own tabs.
The process tree data is included in this data set but is easier to view in the following section with the process tree viewer.
Display Process Tree
The first cell extracts the behavior tree and builds the process tree dataframe.
Display the tree
KQL Query Clause generator
Use this to generate filter clauses to search for the behaviors. For example, you can extract the IP addresses or command lines and build a query to search for matches in your organization.
Select the category of data that you want to use to generate the query.
Connect to Microsoft Sentinel
We need to load a Microsoft Sentinel query provider and authenticate in order to retrieve the schema.
Select table/column and the behavior data values for the query
TI Additional Lookups
You can use the MSTICPy TI provider to do additional lookups on values that you see in the behavior data.
By default, TILookup uses all configured providers, including VirusTotal