Kaspersky Research Sandbox provides an API to obtain task parameters.
Request
Request method: GET
Endpoint: https://<server name>/api/v1/sandbox/tasks/{task ID}
Parameters
Obtaining task parameters
Parameter |
Data type |
Occurrence |
Description |
---|---|---|---|
|
string |
Required |
Object execution task ID (GUID). |
cURL command sample: $ curl --user <user name> --request GET 'https://<server name>/api/v1/sandbox/tasks/<task ID>' You will be asked to enter your password. The password is not displayed while you type it. |
Responses
Endpoint returns a JSON object that contains parameters of the specified task.
200 OK
Sandbox task parameters are obtained successfully.
200 OK response parameters
Parameter |
Data type |
Description |
|
---|---|---|---|
|
string <date-time> |
Date and time when the task was created, specified in the ISO 8601:2004 format (YYYY-MM-DDThh:mm:ssZ). |
|
|
string <date-time> |
Date and time when analysis of results was completed, specified in the ISO 8601:2004 format (YYYY-MM-DDThh:mm:ssZ). |
|
|
string |
Status of the executed file or web address. Available values:
For tasks with status other than |
|
|
string |
Color of the file or web address zone ( |
|
|
string <date-time> |
Date and time when anti-virus bases were last updated, specified in the ISO 8601:2004 format (YYYY-MM-DDThh:mm:ssZ). |
|
|
string |
Task ID (GUID). |
|
|
string |
Result ID. |
|
|
string |
File execution or web address browsing task state. Available values:
|
|
|
string |
Error code. Available values:
|
|
|
string |
Error message. |
|
|
string |
Original name of the uploaded file. |
|
|
string |
Name of the uploaded file. |
|
|
string |
Name of the uploaded archive. |
|
|
string |
Extension of the executed file (for example, |
|
|
string |
Automatically detected type of executed file. |
|
|
string |
MD5 hash of the executed file. |
|
|
string |
SHA1 hash of the executed file. |
|
|
string |
SHA256 hash of the executed file. |
|
|
string |
SSDeep hash of the executed object. |
|
|
string |
Operating system that was used as an execution environment. If an incorrect value is specified, titles of all available environments will be returned in the |
|
|
string |
Password for the archive. |
|
|
integer |
Size of the executed file in bytes. |
|
|
integer |
File execution or web address browsing time in seconds. |
|
|
array |
List of detected objects:
|
|
|
array |
List of created screenshots. |
|
|
boolean |
Indicates whether HTTPS traffic generated by the executed file or web address was decrypted. Available values:
|
|
|
boolean |
Indicates whether full (both static and dynamic) object analysis (including execution in the Sandbox) was performed. Available values:
|
|
|
boolean |
State of the static analysis stage:
|
|
|
string |
Name of the network channel used by the object to access the internet. Available values:
|
|
|
string |
Name of the network channel that the object actually used to access the internet (for example, US). |
|
|
boolean |
Indicates whether if there is report data for the task. |
|
|
boolean |
Indicates whether a debug report was generated. Available values:
|
|
|
string |
Web address browsed in Sandbox. |
|
|
string |
Command line parameters used to execute the object in the Sandbox. |
|
|
boolean |
Indicates whether Kaspersky Research Sandbox browsed the links in the opened documents. Available values:
This parameter is available only if a Microsoft Windows based execution environment is selected. If you specified an execution environment based on Android (including custom environments), then the value of this parameter is ignored during file execution. However, the task results contain the |
|
|
string |
Password for the protected document. If the password is not specified, the value of this parameter is |
|
|
string |
Type of a sample. |
|
|
array of objects |
Automatically calculated execution parameters:
|
|
|
integer |
Threat score of objects, which is based on metrics and data obtained during task execution. |
|
|
integer |
Timeout in seconds after which the application in which a Microsoft Office document was opened will be closed. Available values: Only relevant for Microsoft Office documents sent to Windows environments. |
|
|
array of objects |
The status of the YARA and Suricata scan task of the object and its extracted files:
Possible
|
|
|
boolean |
Indicates whether the VNC access was used for the task. Available values:
|
|
|
boolean |
Indicates whether automatic sample start was enabled in the VNC mode. Available values:
|
|
|
string |
Date and time when VNC was started for the task. |
|
|
string |
Time till the VNC access will be disabled, in seconds. |
|
|
boolean |
Indicates if VNC is currently active for the task. Available values:
|
|
|
boolean |
Indicates whether clicker was disabled in the VNC mode. Available values:
|
|
200 OK response for file example: { "Created": "2024-11-07T12:25:48.845463Z", "Processed": "2024-11-07T12:42:17.656575Z", "Status": "Malware", "Zone": "Red", "AvBasesVersion": "2024-11-06T10:41:00Z", "TaskId": "5dd567...e164f6f9", "ResultID": "", "TaskState": "Completed", "ErrorCode": "", "ErrorMessage": "", "OriginalFileName": "file.rar", "FileName": "file.exe", "ArchiveSampleName": "file", "FileExtension": "exe", "FileType": "exe x32", "Md5": "86f205f...a2df", "Sha1": "252be6e...d4530a7", "Sha256": "a6e226f...0b988", "SSDeep": "3072:yM1ypc...GQkxVj:yHv6X...IVj", "VirtualMachineId": "Win10_x64", "UnpackPassword": "", "FileSize": 135705, "EmulationTimeSeconds": 1800, "Detects": [ { "IsNotAVirus": false, "Threat": "Backdoor.Win32.Zebrocy.sb", "Severity": 800, "DetectTechnology": "SBscaner" }, { "IsNotAVirus": false, "Threat": "Trojan.Win32.KL_APT_TEST_DETECT.gen", "Severity": 800, "DetectTechnology": "SBscaner" }, { "IsNotAVirus": false, "Threat": "Trojan.Win32.Reconyc.sb", "Severity": 800, "DetectTechnology": "SBscaner" } ], "Screenshots": [ { "FullName": "0.wnd.scr.png", "PreviewName": "0.wnd.prv.png" }, { "FullName": "1.wnd.scr.png", "PreviewName": "1.wnd.prv.png" }, { "FullName": "2.wnd.scr.png", "PreviewName": "2.wnd.prv.png" }, { "FullName": "3.wnd.scr.png", "PreviewName": "3.wnd.prv.png" } ], "DecryptHttps": true, "PreScan": false, "PreScanState": { "CalcParam": true, "AvsScan": true, "StatPars": false }, "Channel": "", "UsedChannel": { "ID": 1, "Name": "Beeline_ODC1_01", "Available": true, "Description": "Beeline_ODC1_01" }, "IsDataAvailable": true, "DebugReport": false, "Url": "", "CmdLineParams": "", "ClickLinks": false, "DocsPassword": "", "SampleType": "single_file_arch", "CalculatedParams": { "ExecEnv": "Win10_x64", "ExecTime": 1800 }, "ThreatScore": 97, "AppsCloseTimeout": 0, "Userscan": { "Yara": { "Status": "not scanned", "Filename": "", "ScanningTime": null }, "Suricata": { "Status": "not scanned", "Filename": "", "ScanningTime": null } }, "VncAccess": true, "VncSampleAutostart": true, "VncStarted": null, "VncTimeLeft": 0, "VncStatus": 0, "DisableClicker": true } |
400 Bad Request
Failed to Sandbox task parameters due to incorrect query.
400 Bad Request response parameters
Parameter |
Data type |
Description |
---|---|---|
|
string |
Error ID. |
|
string |
Error description. |
|
string |
Additional information, if available. |
Error examples: Incorrect {"code":6,"message":"task not found"} Incorrect {"code":29,"message":"bad task id"} |
401 Unauthorized
Failed to obtain Sandbox task parameters due to incorrect user credentials.
404 Not Found
Task with specified ID not found.
500 Internal Server Error
Failed to obtain sandbox task parameters due to an internal server error.
Page top