{"id":1127,"date":"2020-11-06T06:51:15","date_gmt":"2020-11-06T06:51:15","guid":{"rendered":"\/cybersecurity-blog\/?p=1127"},"modified":"2025-06-27T13:34:27","modified_gmt":"2025-06-27T13:34:27","slug":"subscriptions-community-plan","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/","title":{"rendered":"ANY.RUN Subscriptions:                the Community Plan"},"content":{"rendered":"\n<p>ANY.RUN is the first interactive online malware analysis sandbox. The service detects, analyzes, and monitors cybersecurity threats. And it includes various types of accounts for the needs of different users. We hope you are one of these users that chose ANY.RUN for their work. And are you trying to make up your mind about what subscription to begin with? <\/p>\n\n\n\n<p>Today we are starting the series of articles that will help you out. <a rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=community_plan\" target=\"_blank\">ANY.RUN<\/a> provides 4 plans for your needs. This time we would like to tell you about the community account, its features, and use cases. The plan provides a diverse stack of functionalities that lets you do a full-fledged malware investigation.<br><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>A use case<\/strong><\/p>\n\n\n\n<p>The best way to see all features at work is to start the analysis. Why don\u2019t we examine one of the samples? Let\u2019s do it!&nbsp;<br><\/p>\n\n\n\n<p>The first step is to create a new task. <strong>Windows 7, the 32-bit rate<\/strong> is available by default. This operating system is one of the most popular ones and that is the reason why it is available for the Community plan\u2019s users.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>Then you can choose the file to upload. Remember, you can input up to <strong>16 Mb per file<\/strong>. We should note that there is hardly any malware of this size in the wild. If you want to submit a URL address to a file just either type or paste it in the input field. Our service offers you to<strong> <\/strong>pick one of the most used browsers to open your link. Advanced malicious programs act differently on various browsers. And, the latest version of them might be crucial for investigations. So, <strong>URL analysis in different browsers<\/strong> will come in handy. By checking the \u201cOpen in default browser\u201d box, the URL address opens on the Internet Explorer browser.<br><\/p>\n\n\n\n<p>And we\u2019re ready to run the task! Furthermore, if you have more suspicious files for analysis, don\u2019t worry, you get a chance to launch an <strong>unlimited number of public analyses<\/strong>! Upload as many files as you need! But note, please, that your task will be shared publicly with the Community plan.\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/11\/scr1-1.png\" alt=\"\" class=\"wp-image-1138\"\/><\/figure>\n\n\n\n<p>Give the machine a few moments to load and here we go! Now we can monitor the file behavior in the environment.<\/p>\n\n\n\n<p>To observe this task use the following link:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/5d684aa5-f184-475d-bc94-b2a9308ddb53\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/5d684aa5-f184-475d-bc94-b2a9308ddb53\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/LNjC1ynVh8g_ZLCuPepO5MfUiPW6L_pwZsq8sVzDJgMQSPOVyjR2xAggfArkuuiQZchVu573ZgD1rWnvXhUIFG6GUdC2nNwPYaE5UCrzuHbXOWAgNSD0NZ37iwVzTnSWsC7IQZd-\" alt=\"\" style=\"width:837px;height:493px\"\/><\/figure>\n\n\n\n<p>The duration of the analysis is set to <strong>60 seconds<\/strong>, also there is a possibility to add up to 4 minutes. This time is enough to explore the suspicious file and interact with the virtual machine. ANY.RUN\u2019s <strong>interactive access <\/strong>is a real game changer! Just imagine that you&#8217;re working with an attacked computer, but completely safe. Drag a mouse, tap keys, reboot the system, open files, input data\u2014 do whatever you want to research the file.&nbsp;<br><\/p>\n\n\n\n<p>You get access to the operating system just only a few seconds after starting. There is no need to wait for the end of the analysis \u2014 get the first results in real-time.<br><\/p>\n\n\n\n<p>Let\u2019s execute the word document into the Windows 7 environment in the virtual machine.&nbsp; We can see how the file is loading. And on the right, all processes are structured logically in the process tree.&nbsp;<\/p>\n\n\n\n<p>To finish the task, click the \u201cStop\u201d button in the Up-right corner.<br><\/p>\n\n\n\n<p>As you can see in the &#8220;Process details&#8221;, a biohazard sign has appeared. It means that the Qbot malware was detected by local signatures \u2014 created file and command-line argument of the cmd.exe process. To get more info, check Advanced details.&nbsp;<br><\/p>\n\n\n\n<p>And now it\u2019s time to dive into analysis with all collected information.&nbsp;In the &#8220;Connections&#8221; section, you see 1 successful response which downloaded the main payload \u2014 Qbot trojan itself. Clicking on any of them in the Headers column to research &#8220;Request details&#8221;. Copy the necessary data, if you will.&nbsp;<br><\/p>\n\n\n\n<p>In the &#8220;Threats&#8221; sector, we get quite a bunch of results listed. If you are interested in a particular one, filter by message. The Class column gives you the whole idea of what was hiding from you. Click on any of them to uncover the &#8220;Threat details&#8221;.&nbsp;<br><\/p>\n\n\n\n<p>It\u2019s time to get acquainted with \u201cFile modifications\u201d. And collect Process details.<\/p>\n\n\n\n<p>To find out what signatures identified malware, click on the process with the biohazard sign, and detected malware tag. In our case, click on \u201cQBOT was detected\u201d and you can see all signatures through which it was detected. In this example, it\u2019s the created file and arguments of the command line cmd.exe. Get more information in \u201cMore info\u201d in this process.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/kVW3adVqoCRFwdl6nNsnqVH8dTcXuYYk6O22FpR7huJLMcj5xNPwaK-BFT6CxmNjIH3q03XPQW7XAZ_ow2gZetRDnf4_JzeAAXgX1eMYKWOAEQ0v-bhOpn9IY98APhuxeXoCfn_k\" alt=\"\" style=\"width:841px;height:496px\"\/><\/figure>\n\n\n\n<p>The reports and necessary information can be exported in PDF, JSON, <strong>HTML,<\/strong> and <strong>PCAP<\/strong> format. Moreover, you get additional details in the info block. For example, the <strong>process behavior graph<\/strong> gives you extra data such as a file\u2019s type, the malware family, the direction of injection, etc. Pick a process to bring up the process details. To find out about the process of an attack, use the <strong>Mitre ATT&amp;CK matrix<\/strong>. The whole logic is shown here from the initial access to the impact. Moreover, you can research all the used tactics.&nbsp;<br><\/p>\n\n\n\n<p>This is the way you finish the analysis! Threats are detected and processes are researched.&nbsp; And we are definitely not leaving empty-handed \u2014&nbsp; all significant material with us, such as detailed reports, a process graph, etc. Of course, it was not an elaborate investigation as the one you get on other plans. However, the essential results you get anyway.&nbsp;<br><\/p>\n\n\n\n<p>Besides the analyses, you get an opportunity to research the enormous ANY.RUN database of the <a href=\"https:\/\/app.any.run\/submissions?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=community_plan\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">public submissions<\/a>. What a great source to learn and improve as a cybersecurity specialist!&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Conclusion<\/strong>&nbsp;<br><\/p>\n\n\n\n<p>The Community plan can be a discovery for you. You can perform analysis for free, isn\u2019t it an advantage? But If you want to go deeper, check out other plans for expanded functionalities, more opportunities, and even more comprehensive reports. Sounds interesting? Stay tuned to learn more about other plans in our next articles. You can also find information about all plans and their description <a href=\"https:\/\/app.any.run\/plans\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">here<\/a>. <\/p>\n\n\n\n<p>And don\u2019t forget that you can find more examples of how to use the Community plan in the video below. Go ahead and watch it!&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to use Community Plan of ANY.RUN malware sandbox\" width=\"770\" height=\"578\" src=\"https:\/\/www.youtube.com\/embed\/nEr7n1gP_b8?feature=oembed&#038;enablejsapi=1&#038;origin=:\/\/\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN is the first interactive online malware analysis sandbox. The service detects, analyzes, and monitors cybersecurity threats. And it includes various types of accounts for the needs of different users. We hope you are one of these users that chose ANY.RUN for their work. And are you trying to make up your mind about what [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3400,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[57,34,26],"class_list":["post-1127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-instructions","tag-anyrun","tag-malware-analysis","tag-training"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Subscriptions: the Community plan \u2014 ANY.RUN Blog<\/title>\n<meta name=\"description\" content=\"The service\u2019s free account gives users access to various functionalities with an example of how to use it. Read the article to find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Subscriptions: the Community Plan\",\"datePublished\":\"2020-11-06T06:51:15+00:00\",\"dateModified\":\"2025-06-27T13:34:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\"},\"wordCount\":1085,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware analysis\",\"training\"],\"articleSection\":[\"Instructions on ANY.RUN\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\",\"name\":\"Subscriptions: the Community plan \u2014 ANY.RUN Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2020-11-06T06:51:15+00:00\",\"dateModified\":\"2025-06-27T13:34:27+00:00\",\"description\":\"The service\u2019s free account gives users access to various functionalities with an example of how to use it. Read the article to find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Subscriptions: the Community Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Subscriptions: the Community plan \u2014 ANY.RUN Blog","description":"The service\u2019s free account gives users access to various functionalities with an example of how to use it. Read the article to find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Subscriptions: the Community Plan","datePublished":"2020-11-06T06:51:15+00:00","dateModified":"2025-06-27T13:34:27+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/"},"wordCount":1085,"commentCount":5,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware analysis","training"],"articleSection":["Instructions on ANY.RUN"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/","url":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/","name":"Subscriptions: the Community plan \u2014 ANY.RUN Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2020-11-06T06:51:15+00:00","dateModified":"2025-06-27T13:34:27+00:00","description":"The service\u2019s free account gives users access to various functionalities with an example of how to use it. Read the article to find out more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Subscriptions: the Community Plan"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1127"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1127"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1127\/revisions"}],"predecessor-version":[{"id":14499,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1127\/revisions\/14499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3400"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}