Results tab

Kaspersky Threat Intelligence Portal provides information about detected items and activities that were registered during the file execution. For registered users, execution map, information about suspicious activities, and screenshots are also available.

Dynamic analysis detects

Detects that were registered during the file execution.

Dynamic analysis detects

Field name

Description

Status

Danger zone (level) associated with the detect (Malware or Adware and other).

Name

Name of the detected object (for example, HEUR:Exploit.Script.Blocker). Each item in the list is clickable—you can click it to view its description on the Kaspersky threats website.

Triggered network rules

SNORT and Suricata rules that were triggered during analysis of traffic from the executed file.

Triggered network rules

Field name

Description

Zone

Danger zone (level) associated with the network traffic detected by the SNORT or Suricata rule (High, Medium, Low, Info).

Rule

SNORT or Suricata rule name.

Execution map

Graphically represented sequence of the file activities and relationships between them.

Execution map is available only for registered users.

The root node of the tree represents the executed file. Each tree element is marked according to its danger level (High, Medium, or Low). You can click a tree element to view detailed information. You can also zoom the execution map by scrolling the map area.

Suspicious activities

Suspicious activities registered during the file execution.

This section is available only for registered users.

Suspicious activities

Field name

Description

Zone

Danger zone (level) of the registered activity (High, Medium, Low).

Severity

Numerical value of the danger level of the registered activity (integer 1–999).

Description

Activity description. For example, "Executable has obtained the privilege," "The file has been dropped and executed," or "The process has injected binary code into another process." Certain descriptions contain mapping with MITRE ATT&CK threat classification. For example, "MITRE: T1082 System Information Discovery."

Screenshots

Set of screenshots that were taken during the file execution.

Screenshots are available only for registered users.

Page top