- Overview
- Using P2A
- Getting Started
- Analysis options
- Analysis Events
- API reference
- FAQ
- Release Notes
P2A Sandbox Events and Operations Documentation
The P2A (Antivirus Analysis Platform) sandbox environment generates events to capture various activities within a controlled analysis environment. These events help in analyzing the behavior of files and processes. Each event is associated with specific operations that provide insights into the actions performed by the analyzed entity.
P2A Sandbox Event Search Documentation
In the P2A Sandbox GUI, you can use the event search functionality to efficiently locate specific events within your analysis results. This feature enables you to filter events based on various criteria, making it easier to pinpoint relevant information.
Usage Parameters
The event search functionality allows you to use logical operators and expressions to create custom queries. Here are the key parameters:
- [ Symbol : & ]: Represents the logical AND operator. Use it to narrow down your search by
combining multiple criteria. For example, searching for events that match both "P2AMemoryEvent" and "PROTECT"
operations:
P2AMemoryEvent&PROTECT
. - [ Symbol : | ]: Represents the logical OR operator. Utilize it to broaden your search by including
events that match any of the specified criteria. For example, searching for events of type "P2AFileEvent" or
"P2AMemoryEvent":
P2AFileEvent|P2AMemoryEvent
. - All Events: To retrieve all available events in your analysis results, you can use the expression
*all*
.
Use Case: Searching for Memory Protection Events
Let's consider a practical use case where you want to investigate events related to memory protection in your analysis results.
Suppose you are analyzing a potentially malicious binary, and you suspect that it attempts to modify memory protection settings. To focus on memory protection events, follow these steps:
- Access the P2A Sandbox GUI and open the analysis result for your binary.
- In the event search bar, enter the following query:
P2AMemoryEvent&PROTECT
- Click the "Search" button.
The search results will now display only those events that match the criteria "P2AMemoryEvent" with the "PROTECT" operation. You can further investigate these events to gain insights into the binary's memory protection behavior.
This use case demonstrates how event search can help you efficiently locate and focus on specific types of events within your analysis results, making your analysis process more effective.
-
Events list
- OPEN: Signifies the opening of a file.
- READ: Indicates read operations on a file.
- WRITE: Represents write operations on a file.
- DELETE: Signifies the deletion of a file.
- RENAME: Denotes renaming operations on a file.
- CREATE: Indicates the creation of a file.
- CLOSE: Represents closing operations on a file.
- RUN: Signifies the running of a process.
- STOP: Indicates the stopping of a process.
- OPEN: Denotes opening operations on a process.
- RESUME: Represents the resumption of a process.
- CREATE: Signifies the creation of a new process.
- KILL: Indicates killing or termination operations on a process.
- SCHEDULE: Denotes scheduling operations for a process.
- RUN: Signifies the running of a thread.
- STOP: Indicates the stopping of a thread.
- OPEN: Denotes opening operations on a thread.
- RESUME: Represents the resumption of a thread.
- CREATE: Signifies the creation of a new thread.
- KILL: Indicates killing or termination operations on a thread.
- MODIFY: Denotes modification operations on a thread.
- OPEN: Signifies the opening of a registry key.
- READ: Indicates read operations on a registry key.
- WRITE: Represents write operations on a registry key.
- ENUM: Denotes the enumeration of registry keys.
- DELETE: Signifies the deletion of a registry key.
- CREATE: Indicates the creation of a registry key.
- LOAD: Indicates the loading of a module or library.
- UNLOAD: Represents the unloading of a module or library.
- READ: Denotes a read operation on memory.
- WRITE: Represents a write operation to memory.
- ALLOC: Indicates memory allocation.
- FREE: Represents memory deallocation or freeing.
- PROTECT: Denotes the protection of memory regions.
- EXECUTE: Indicates the execution of code from memory.
- CONNECT: Denotes the establishment of a network connection.
- DISCONNECT: Represents the termination of a network connection.
- SEND: Indicates the sending of data over the network.
- RECV: Denotes the receiving of data from the network.
- RESOLVE: Represents the resolution of a network address.
- BIND: Indicates binding to a network address.
- ACCEPT: Denotes accepting a network connection.
- CRYPT: Denotes cryptographic operations.
- DECRYPT: Represents cryptographic decryption operations.
- SIGN: Indicates cryptographic signing operations.
- HASH: Denotes cryptographic hashing operations.
- VERIFY: Represents cryptographic verification operations.
- KEYEXPORT: Indicates the export of cryptographic keys.
- KEYIMPORT: Denotes the import of cryptographic keys.
- KEYGEN: Represents cryptographic key generation operations.
- OPEN: Denotes the opening of a service.
- CREATE: Represents the creation of a service.
- RUN: Indicates the running of a service.
- CONTROL: Denotes control operations on a service.
- CHANGE: Represents changes made to a service.
- DELETE: Indicates the deletion of a service.
- QUERY: Denotes querying operations on a service.
- QUERY: Denotes querying time-related information.
- DELAY: Represents a time delay event.
- WAIT: Indicates waiting for a specific time or event.
- TIMER: Denotes timer-related events.
- CHANGE: Represents changes in the system's time.
- CREATE: Denotes the creation of mutex, named pipe, semaphore... objects.
- P2AHOOKMODIFYDATA: Signifies modifications to hooked data.
- OUTPUT_DEBUG_STRING: Indicates the output of debug strings.
- PRINT: Signifies printing operations.
1. P2AFileEvent
Operations:
2. P2AProcessEvent
Operations:
3. P2AThreadEvent
Operations:
4. P2ARegistryEvent
Operations:
5. P2AModuleEvent
Operations:
6. P2AMemoryEvent
Operations:
7. P2ANetworkEvent
Operations:
8. P2ACryptoEvent
Operations:
9. P2AServiceEvent
Operations:
10. P2ATimeEvent
Operations:
11. P2AMutexEvent, 12.P2ANamedPipesEvent, 13. P2ASemaphoreEvent, 14. P2AEventEvent
Operations:
15. P2AHookModifyDataEvent
Operations:
16. P2ADebugStringEvent
Operations:
17. P2APrintEvent
Operations: