Automated Malware Sandbox Analysis
Detonate. Enrich. Investigate. Repeat.
An artifact in an investigation is a question mark until it's detonated. SandGNAT automates the answer — and puts it back in the investigation where the question was asked.
An artifact enters the investigation as a question. SandGNAT detonates it, extracts behavioral indicators, and posts the answers back — automatically, without a separate queue or manual correlation step.
C2 domains, IPs, URLs contacted during execution. Protocols used, ports, connection timing.
Dropped files, written paths, created processes. Hashes for every artifact observed during detonation.
Registry keys written or modified. Service installations, scheduled tasks, persistence mechanisms observed.
Execution chain, API calls, injection attempts, anti-analysis techniques detected during sandbox run.
Behaviors mapped to ATT&CK techniques where applicable. Surfaces relevant TTPs automatically.
Malicious / suspicious / benign verdict with confidence score. Analyst retains final judgment.
When a hash recurs across investigations, SandGNAT surfaces its prior detonation history — connecting current activity to past findings automatically.
Network IOCs extracted by SandGNAT feed SenseGNAT's anomaly detection. C2 domains and IPs from detonation become behavioral indicators to watch for in live traffic.
ATT&CK techniques mapped by SandGNAT seed RedGNAT validation runs. Confirm whether your defenses catch what the sample actually does — not what you assume it does.