SandGNAT

Automated Malware Sandbox Analysis

Detonate. Enrich. Investigate. Repeat.

The Problem

Suspicious artifacts pile up faster than analysts can detonate them

  • Manual sandbox submission is slow — each artifact is a ticket, a wait, a manual review
  • Results arrive in sandbox vendor formats — another normalization step before they're useful
  • Detonation findings are disconnected from the investigation they were triggered by
  • Repeat detonation of known samples wastes analyst time and sandbox capacity

The enrichment gap

An artifact in an investigation is a question mark until it's detonated. SandGNAT automates the answer — and puts it back in the investigation where the question was asked.

Capabilities

Automated detonation & artifact enrichment

  • Automated submission — GNAT routes suspicious artifacts to SandGNAT without analyst intervention
  • Detonation & behavioral extraction — file behavior, network calls, registry changes, dropped files, C2 indicators
  • STIX enrichment — findings published back to the GNAT investigation graph as structured objects
  • Deduplication — known samples aren't re-detonated; cached findings are returned immediately

Closed loop

An artifact enters the investigation as a question. SandGNAT detonates it, extracts behavioral indicators, and posts the answers back — automatically, without a separate queue or manual correlation step.

Architecture

Triggered by GNAT. Results back to GNAT.

Trigger GNAT Workflow Engine Routes suspicious artifacts when investigation rules match
Detonation SandGNAT Detonates artifact in isolated environment, extracts behavioral IOCs
Enrichment Investigation Graph Detonation findings published as STIX enrichment objects
The detonation pipeline is entirely internal to the ecosystem. No external sandbox vendor required — though connectors to third-party sandboxes are available.
Extraction

From detonation to structured intelligence

Network Indicators

C2 domains, IPs, URLs contacted during execution. Protocols used, ports, connection timing.

File Artifacts

Dropped files, written paths, created processes. Hashes for every artifact observed during detonation.

Registry & System

Registry keys written or modified. Service installations, scheduled tasks, persistence mechanisms observed.

Behavioral Profile

Execution chain, API calls, injection attempts, anti-analysis techniques detected during sandbox run.

MITRE ATT&CK Mapping

Behaviors mapped to ATT&CK techniques where applicable. Surfaces relevant TTPs automatically.

Verdict & Score

Malicious / suspicious / benign verdict with confidence score. Analyst retains final judgment.

Efficiency

Don't detonate the same thing twice

  • Every detonation result is cached by hash
  • When GNAT routes an artifact that was already detonated, cached results are returned immediately
  • Reduces sandbox capacity consumption — saves resources for novel samples
  • Deduplication works across investigations — findings from a previous case can enrich a new one

Cross-investigation value

When a hash recurs across investigations, SandGNAT surfaces its prior detonation history — connecting current activity to past findings automatically.

Ecosystem Integration

Detonation findings power the wider investigation

SenseGNAT

Network IOCs extracted by SandGNAT feed SenseGNAT's anomaly detection. C2 domains and IPs from detonation become behavioral indicators to watch for in live traffic.

RedGNAT

ATT&CK techniques mapped by SandGNAT seed RedGNAT validation runs. Confirm whether your defenses catch what the sample actually does — not what you assume it does.

A single detonation can simultaneously enrich a network detection rule, validate a detection capability, and close an investigation finding — all from the same artifact.
For Analysts

Every artifact gets an answer. Automatically.

  • Suspicious artifacts are detonated without a separate submission step
  • Detonation results appear in your investigation graph — no context switch to a sandbox console
  • Behavioral indicators from detonation are linked to the artifact and to the broader investigation
  • MITRE ATT&CK mappings surface relevant TTP context immediately
  • Prior detonation history surfaces automatically when a hash recurs
Adoption

Getting started with SandGNAT

  1. Have GNAT core deployed with the workflow engine active
  2. Deploy SandGNAT and configure the GNAT connector
  3. Configure routing rules in GNAT: which artifact types and sources trigger automatic submission
  4. Run a test investigation — submit a known sample and verify detonation results land in the graph
  5. Tune routing rules to match your operational tempo and sandbox capacity
Start narrow: route only files from high-confidence suspicious sources. Expand as you validate the pipeline.
Resources

Next steps