Task

The Task object contains data about a task. Task is a file analysis on a single platform. Task can contain a various set of keys: TaskBasic, TaskFinished, or TaskProcessing.

TaskBasic

The TaskBasic object contains general information about a task. Such an object with the basic set of keys is used in a list of Analysis objects.

Structure

Key

Type

Description

id

integer

Task ID.

status

string

Task status. Available values: in queue, failed, processing, deletedsuccessful.

platform_code

string

Platform.code.

start_date

string (datetime.iso8601)

Date and time the task was started.

end_date

string/null (datetime.iso8601)

Date and time the task was completed.

maliciousness

integer/null

Maliciousness, from 0 to 100.

Example

{

   "id": 20,

   "status": "failed",

   "platform_code": "winxpx86",

   "start_date": "2018-07-30T16:54:07.156371",

   "end_date": "2018-07-30T16:55:07.156371",

   "maliciousness": null

}

TaskFinished

The TaskFinished object contains the keys of the TaskBasic object and analysis results for the specified platform.

Structure

Key

Type

Description

detects

string[]

A list of detected threats. The list can include the following strings:

yara: a YARA rule has triggered;

behavior: malicious or suspicious behavior for a file has been detected;

files_dumps: the threats have been detected in created files or/and memory dumps.

end_date

string/null (datetime.iso8601)

Date and time the task was completed.

id

integer

Task ID.

maliciousness

integer/null

Maliciousness, from 0 to 100.

platform_code

string

Platform.code.

rules

object/null

List of triggered rules.

 

malicious

string[]

List of rules that have been triggered due to malicious activity of the sample.

 

neutral

string[]

List of rules that have been triggered due to neutral activity of the sample.

 

suspicious

string[]

List of rules that have been triggered due to suspicious activity of the sample.

sample_detect

string/null

Name of the threat detected using signature databases.

start_date

string (datetime.iso8601)

Date and time the task was started.

status

string

The current status of the task. Available values: in queue, failed, processing, deleted, successful.

tags

string[]

The list of tags retrieved from the triggered YARA rules.

verdict

string

Overall result of the file maliciousness corresponding to one of three categories. The higher number corresponds to the higher level of the maliciousness probability. Available values: none, clean1, clean2, suspicious1, suspicious2, malware1, malware2.

yara_rules

object[]

List of triggered YARA rules.

 

name

string

The name of the YARA rule

 

rule_type

string

The type of the YARA rule. Available values: user (a user-defined rule) and system (a system-defined rule).

 

severity

string

The file behavior category. When adding a YARA rule, you should specify the behavior category that will be assigned to the sample if the YARA rule is triggered. The specified category appears in the severity field. Available values: neutral, suspicious, malware. More about adding a YARA rule…

Example

{

 "id": 16916,

 "status": "successful",

 "maliciousness": 100,

 "platform_code": "winxpx86",

 "start_date": "2018-12-12T11:29:44.645968+00:00",

 "end_date": "2018-12-12T11:33:37.490050+00:00",

 "verdict": "malware2",

 "rules": null,

 "detects": [

    "files_dumps"

  ],

 "platform_code": "win7x64"

}

TaskProcessing

TaskFinished contains the keys of the TaskBasic object and data about the analysis process.

Structure

Key

Type

Description

end_date

string

Date and time the task was completed.

id

integer

Task ID.

maliciousness

integer/null

Maliciousness, from 0 to 100.

message

string/null

Message about the task progress.

platform_code

string

Platform.code.

progress

integer

Task progress, in percent.

start_date

string (datetime.iso8601)

Date and time the task was started.

status

string

The current status of the task. Available values: in queue, failed, processing, deleted, successful.

Example

{

 "id": 18656,

 "status": "processing",

 "maliciousness": null,

 "platform_code": "win7x86",

 "start_date": "2019-02-07T09:39:11.517117+00:00",

 "end_date": null,

 "message": "Waiting while the file is running (60 sec)…",

 "progress": 19

}