{"id":3979,"date":"2022-11-10T05:58:02","date_gmt":"2022-11-10T05:58:02","guid":{"rendered":"\/cybersecurity-blog\/?p=3071"},"modified":"2022-12-21T06:42:50","modified_gmt":"2022-12-21T06:42:50","slug":"5-sandbox-use-cases-to-reinforce-cybersecurity","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/","title":{"rendered":"5 Sandbox Use Cases to Reinforce Cybersecurity"},"content":{"rendered":"\n<p>Hackers are a lot better at breaching secure systems than most organizations are at detecting threats. This is not a speculative remark.<br><\/p>\n\n\n\n<p>A study examined cybersecurity in government and private sectors, found out that over 90% of networks had vulnerabilities that could lead to breaches.<br><\/p>\n\n\n\n<p>It\u2019s super easy to get infected. Sometimes all that is needed is to carelessly open a CV.<br><\/p>\n\n\n\n<p>For example, In October 2021, researchers <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/unit42.paloaltonetworks.com\/brute-ratel-c4-tool\/\" target=\"_blank\">found<\/a> a backdoor trojan that managed to slip past a whopping 56 security products. The sample, designed to be invisible to end-point detection and antivirus software, targeted HR departments in organizations and dropped the payload from a resume file titled \u201cRoshan-Bandara-CV.\u201d (If your own HR team encounters this gentleman&#8217;s inquiry, do proceed with caution.)&nbsp;<br><\/p>\n\n\n\n<p>How, then, can you improve the security of your organization without giving your cyber defense a complete overhaul?&nbsp;<br><\/p>\n\n\n\n<p>One way is to check suspicious files and links with a malware sandbox.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a malware sandbox?<\/h2>\n\n\n\n<p>You may already be using antivirus and thinking you\u2019re fully protected. However, AV software is just one layer of a robust cybersecurity system.&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Antiviruses <\/strong>are<strong> <\/strong>reactive systems. They rely on the ability to detect known malicious behavior and kill dangerous applications or processes before they can do harm. Since they can\u2019t react to threats they don\u2019t recognize, they are inherently imprecise.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Malware<\/strong> <strong>sandboxes<\/strong> provide a safe environment to detonate malware, collect data, and decide if a file or a link can be trusted. By isolating a sample in a virtual machine, they allow potential malware to rampage through a confined system, leaving behind indicators of compromise.<\/li><\/ul>\n\n\n\n<p>These tools are best used in conjunction, and neither is completely bulletproof on its own.&nbsp;<br><\/p>\n\n\n\n<p>That said, sandboxes have a clear advantage in <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"detecting threats (opens in a new tab)\">detecting threats<\/a>, especially when malware execution is conditional. Here\u2019s why:<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Sandboxes are configurable. <\/strong>Analysts can detect evasive malware by changing locale settings. This helps identify samples that <a rel=\"noreferrer noopener\" aria-label=\"target particular regions (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/3-ways-to-analyze-geo-targeted-malware\/\" target=\"_blank\">target particular regions<\/a> by, for example, setting a&nbsp;system&nbsp;language.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Sandboxes are interactive.<\/strong> Some malware begins executing only after specific system or user events. In an<a rel=\"noreferrer noopener\" aria-label=\" interactive (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-analysis\/\" target=\"_blank\"> interactive<\/a> sandbox, analysts can click on files, run programs, type, or reboot the&nbsp;system.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Sandboxes are great at presenting in-depth data.<\/strong> Researchers can use sandboxes to<a href=\"https:\/\/any.run\/cybersecurity-blog\/retrospective-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" detect malware (opens in a new tab)\"> detect malware<\/a> like Advanced Persistent Threats by looking at the execution events in-depth and studying them through the whole lifecycle of the sample.<\/li><\/ol>\n\n\n\n<p>Let&#8217;s look at how this tool helps detect malicious files and links using <a rel=\"noreferrer noopener\" aria-label=\"ANY.RUN malware sandbox (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=landing\" target=\"_blank\">ANY.RUN malware sandbox<\/a> as&nbsp;an example.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Check malicious links and files on the fly<\/strong><\/h3>\n\n\n\n<p>By checking suspicious files and links in ANY.RUN, you can clear them in real-time.<br><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/140c786c-b594-4cea-964e-00251186b615?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=task1\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">In the task with a cross-site scripting attack<\/a>, hackers created a fake OneDrive login page. If you follow the link carelessly and input your credentials, it steals your email and password before redirecting you to a legitimate Microsoft resource.<br><\/p>\n\n\n\n<p>ANY.RUN can detect this malicious activity by intercepting transmitted packets and analyzing their contents. The service gives a clear warning \u2014 this fake webpage is sending your confidential info to somewhere no-good.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/aUYOR28aJorQYntyGkJHVv36lYFcxHE5TcUWn-3eGk9q3_2ioeHFF2KshIV4u1TeF1ssnbhKaHRWdubsgl2Dx8E2G1EOBiG1Q2x9nFlxEsncKscuYc9TiF6hGz6UXSETCHGWYqjGeDqD0KeOLJzB7Kj8RA1yQpHNaGWf24EHASopOibrY6AmYvKCMTGxIg\" alt=\"task with a cross-site scripting attack\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Analyze the data stream of malicious files and links<\/strong><\/h3>\n\n\n\n<p>It is not uncommon for malware to transmit stolen data in plain text. A .txt file is created, filled with whatever the stealer could pinch, and sent to a server hosted by the attacker.&nbsp;<br><\/p>\n\n\n\n<p>In the <a href=\"https:\/\/app.any.run\/tasks\/774c4490-101b-4463-a31f-10f483ade258\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=task2\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">network stream example<\/a>, we can see how Mass Logger does exactly this, forwarding stolen logins and passwords. ANY.RUN can spot and flag such activity.&nbsp;&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>Just copy and paste the domain name, login, and password to monitor the information stream from the afflicted machine.<br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/_32uGGuk-9Da2yjKviiGVADSeZCJH4JjR5FtcWet6Q6zjyDi_oLcf9OC22rWMuezdrT1GkuC8GGh1nXBWPuiVSwje9-iWjAYiokbfpTAQnrtKbwNbtmZVAYiMyRzozy2LsCAFZjMx348XtM3Z5zES-Kh2CQCbCP6Cz7KNZ4K1Wax7tPcFz_UD2RPw2o5Mw\" alt=\"network stream example\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Change locale to detect malware<\/strong><\/h3>\n\n\n\n<p>There is malware that only executes in systems with a specific set language, timezone, or keyboard&nbsp;layout.&nbsp;<br><\/p>\n\n\n\n<p> For instance, in the <a href=\"https:\/\/app.any.run\/tasks\/6bca21e7-012d-4c0c-ac54-68e831e5b676?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=task3\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Raccoon Stealer task (opens in a new tab)\">Raccoon Stealer task<\/a> stopped executing if you                         picked the&nbsp;Belarus&nbsp;locale&nbsp;(be-BY).<br><\/p>\n\n\n\n<p>We can force the sample to run by restarting the task and setting the locale to the United States (en-US). Right away, we can see indicators of compromise beginning to build up in the list: the sample connects to the control server and ANY.RUN quickly flags it as <a href=\"https:\/\/any.run\/cybersecurity-blog\/raccoon-stealer-v2-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Raccoon malware (opens in a new tab)\">Raccoon malware<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>Changing locale was the difference between spotting a dangerous program or letting it slip through and lead to a potential data breach.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/486u0Rnz1zwH5eOSPIFQJ7inYq-dCjZarTVZP40uPPURZzTT1NWXuyn-8XpM9kjuFG0rf80vuL4i2C_HcyhlyUnBRiZ-E8LlaluznQIUPs7tN6jkdzaXww7vEOQn98TzxfIdYVOP63OjxsPnv2vWGocmA4byDO-g8Et8Tbcztp1jKsZ-E94K8GKvEGSIgQ\" alt=\"locale change to detect malware\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Force malware to run with a system reboot<\/strong><\/h3>\n\n\n\n<p>Some malware samples are dormant until a reboot. ANY.RUN allows analysts to restart the OS, helping to find such variants.&nbsp;<br><\/p>\n\n\n\n<p>After giving it the old \u201cturning it off and on again,&#8221; the malware is put into an active state, and analysts can monitor its behavior.&nbsp;<br><\/p>\n\n\n\n<p>In this Nanocore example, the sample stops running quickly after adding itself to the startup folder. This is enough to hide from most antivirus products, and a lot of malware families use this tactic.&nbsp;<br><\/p>\n\n\n\n<p>Particularly, after adding the y6s2gl.exe process to a startup folder, no new processes are created. With a system reboot, we can force the malware to resume execution and identify it as <a href=\"https:\/\/any.run\/malware-trends\/nanocore?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=mtt\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Nanocore (opens in a new tab)\">Nanocore<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/Y27wLWl9bZOSI4_FVPHwqi5QKLKJz2Sfwcd2F9_Fm3h0OkoHors6KqeeelurXxNQNgMp5KLPCannFjlZOPV6wsZueN3QwHwnoQiaCOJbXaYOe1-Dp9DuT2DyPzUOLYOmblhl78I1cTyNNs6QUuJvK9kZ_7Abs1jRjFuMD0tkEePN6o6B7r5sApvUUdA6Yw\" alt=\"a system reboot case\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Access the analysis results instantaneously<\/strong><\/h3>\n\n\n\n<p>In the event of a breach, every second matters. Waiting even a minute for a report to form can mean the difference between staying safe or dealing with the destructive consequences of an infection.<br><\/p>\n\n\n\n<p>In this <a href=\"https:\/\/app.any.run\/tasks\/f39f3d45-1788-44ba-9cb4-3ddb68e0536d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=task4\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Agent Tesla task<\/a> ANY.RUN is able to pinpoint the malware family in 10 seconds.<br><\/p>\n\n\n\n<p>The virtual machine loads instantly and gives hands-on control over the analysis. We can track the execution events as they appear and collect indicators of compromise as they are recorded.<br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/e45630cCgHuvuo-g4v-HM4fM2-SRNwN-4wuKpGYzaEWb_ozA82udMeIjo6iG5E16wvy7j6qziHlVS1HCEIIcG7bymffoGF8uWsJLlgeuuwrHvCa9f5qeF_wGIVr9biN4sHRzSH86-7PEw_3Ce4aF_d1-rXtTl8qG1zOShKMsC8DMWxhPvmHtIl954NnYPA\" alt=\"fast malware detection\"\/><\/figure><\/div>\n\n\n\n<p>With these 5 use cases, you can detect malicious programs of any complexity and dramatically reduce the risk of exposing your system to malware.&nbsp;<br><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=5_sandbox_use_cases&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN sandbox (opens in a new tab)\">ANY.RUN sandbox<\/a> is completely free to use, requiring only your business email to create an account. The free version\u2019s functionality supports all use cases we\u2019ve covered in this article.<br><\/p>\n\n\n\n<p>Most importantly, remember that it\u2019s a dangerous online world out there. Stay vigilant, and check suspicious files and links. And don\u2019t hide your head in the sand. Use a sandbox instead.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are a lot better at breaching secure systems than most organizations are at detecting threats. This is not a speculative remark. A study examined cybersecurity in government and private sectors, found out that over 90% of networks had vulnerabilities that could lead to breaches. It\u2019s super easy to get infected. Sometimes all that is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3988,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[15,34,65],"class_list":["post-3979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-malware","tag-malware-analysis","tag-malwaresandbox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Sandbox Use Cases to Reinforce Cybersecurity - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"How can you improve the security of an organization?\u00a0One way is to use a malware sandbox. Read about 5 ANY.RUN use cases that will reinforce cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"5 Sandbox Use Cases to Reinforce Cybersecurity\",\"datePublished\":\"2022-11-10T05:58:02+00:00\",\"dateModified\":\"2022-12-21T06:42:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\"},\"wordCount\":1032,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware\",\"malware analysis\",\"malware sandbox\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\",\"name\":\"5 Sandbox Use Cases to Reinforce Cybersecurity - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-11-10T05:58:02+00:00\",\"dateModified\":\"2022-12-21T06:42:50+00:00\",\"description\":\"How can you improve the security of an organization?\u00a0One way is to use a malware sandbox. Read about 5 ANY.RUN use cases that will reinforce cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 Sandbox Use Cases to Reinforce Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Sandbox Use Cases to Reinforce Cybersecurity - ANY.RUN&#039;s Cybersecurity Blog","description":"How can you improve the security of an organization?\u00a0One way is to use a malware sandbox. Read about 5 ANY.RUN use cases that will reinforce cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"5 Sandbox Use Cases to Reinforce Cybersecurity","datePublished":"2022-11-10T05:58:02+00:00","dateModified":"2022-12-21T06:42:50+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/"},"wordCount":1032,"commentCount":5,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware","malware analysis","malware sandbox"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/","url":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/","name":"5 Sandbox Use Cases to Reinforce Cybersecurity - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-11-10T05:58:02+00:00","dateModified":"2022-12-21T06:42:50+00:00","description":"How can you improve the security of an organization?\u00a0One way is to use a malware sandbox. Read about 5 ANY.RUN use cases that will reinforce cybersecurity.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/5-sandbox-use-cases-to-reinforce-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"5 Sandbox Use Cases to Reinforce Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3979"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=3979"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3979\/revisions"}],"predecessor-version":[{"id":4070,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3979\/revisions\/4070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3988"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=3979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=3979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=3979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}