{"id":5037,"date":"2023-05-25T05:57:29","date_gmt":"2023-05-25T05:57:29","guid":{"rendered":"\/cybersecurity-blog\/?p=5037"},"modified":"2023-05-26T13:55:51","modified_gmt":"2023-05-26T13:55:51","slug":"chatgpt-for-analysts","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/","title":{"rendered":"ChatGPT for SOC and Malware Analysis professionals: 3 Real-World Use Cases\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>It&#8217;s pretty clear by now that AI like ChatGPT gives productivity a big push. Studies in all kinds of areas <a href=\"https:\/\/www.forbes.com\/sites\/joemckendrick\/2023\/04\/25\/yes-ai-increases-productivity-study-suggests\/?sh=226ef39912c2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">show<\/a> that using chatbots ramps up efficiency, and this holds true in the realm of malware analysis as well.&nbsp;<\/p>\n\n\n\n<p>&nbsp;Not long ago, we shared thoughts on how <a href=\"https:\/\/any.run\/cybersecurity-blog\/we-asked-chatgpt-to-analyze-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT falls short when it comes to analyzing malware<\/a>. We asked it to interpret and deobfuscate malicious code \u2014 it managed with simplified examples but fell short when faced with real-world scenarios.&nbsp;&nbsp;<\/p>\n\n\n\n<p>So, as a malware analyst, ChatGPT isn&#8217;t taking your place just yet. But <strong>ChatGPT can be a real time-saver by helping with routine tasks<\/strong>.&nbsp;<\/p>\n\n\n\n<p>In this article, let&#8217;s look at 3&nbsp;examples of how you can use ChatGPT to boost productivity:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Writing YARA rules&nbsp;<\/li>\n\n\n\n<li>Writing Suricata rules&nbsp;<\/li>\n\n\n\n<li>Understanding why\/how adversaries exploit a program&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;(We&#8217;ve included prompts for you).&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Writing YARA rules&nbsp;<\/h2>\n\n\n\n<p>At <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=gptforanalysts&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, we occasionally use ChatGPT to speed up our YARA rule writing. What we particularly appreciate is that the AI even includes comments. This feature is a timesaver as it spares you the trouble of coming up with descriptive text. It will also help those of us who are not native English speakers.\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"994\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-994x1024.png\" alt=\"Writing YARA rules\u00a0with ChatGPT\" class=\"wp-image-5094\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-994x1024.png 994w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-291x300.png 291w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-768x791.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-1491x1536.png 1491w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-370x381.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-270x278.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara-740x762.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/yara.png 1650w\" sizes=\"(max-width: 994px) 100vw, 994px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>It&#8217;s cool that we&#8217;ve got a YARA rule template with the lines of interest so quickly. It really simplifies the routine job. However, the chat&#8217;s answer needs to be checked and refined by hand:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>GPT forgot to specify that strings can be in 2 encodings \u2013 ascii and wide.<\/li>\n\n\n\n<li>It missed one extra question in the $str4 string because the original one probably needed 5 characters replacement.<\/li>\n\n\n\n<li>The chat did not write an optimal condition by listing $str1, $str2 etc., it could have just specified &#8220;all of them&#8221;. <\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>Anyway, it speeds up work considerably.<\/p>\n\n\n\n<p>What&#8217;s more, GPT helpfully clarifies the reasoning behind its choices in the follow-up section, aiding in the evaluation of its logic.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"758\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-1024x758.png\" alt=\"Writing YARA rules\u00a0with ChatGPT\" class=\"wp-image-5039\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-1024x758.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-300x222.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-768x568.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-1536x1137.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-370x274.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-270x200.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-740x548.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>On the flipside, though, it can get a bit wordy sometimes and stray into an unasked-for explanation about what YARA is. Here&#8217;s a prompt you can use to counter that:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-background has-fixed-layout\" style=\"background-color:#8282822b\"><tbody><tr><td><em>GPT, could you help me write a YARA rule? I am trying to detect a specific malware<\/em><br><em> sample which has the following characteristics: <\/em><br><em>[REPLACE WITH CHARACTERISTICS]. <\/em><br><em>How can I write a YARA rule that accurately identifies this malware? <\/em><br><em>Do not explain about YARA, provide a rule, following with an overview of the logic. <\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2. Writing Suricata rules&nbsp;<\/h2>\n\n\n\n<p>We&#8217;ve noticed that ChatGPT can struggle with writing <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rules<\/a>, and minor errors can pop up frequently. But more often than not, it comes up with results that are &#8220;almost there,&#8221; proving itself to be a handy time-saving tool.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"950\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-1024x950.png\" alt=\"Writing Suricata rules\u00a0with ChatGPT\" class=\"wp-image-5041\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-1024x950.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-300x278.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-768x712.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-1536x1425.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-370x343.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-270x250.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2-740x686.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/image-2.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It&#8217;s wise to steer clear of using GPT&#8217;s output directly in a production setting. But if you treat it more like a rough draft, it can certainly save you some typing. Bearing this in mind, here&#8217;s a prompt you could use:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-background has-fixed-layout\" style=\"background-color:#8282822b\"><tbody><tr><td><em>ChatGPT, please generate a Suricata rule that detects [YOUR CONDITION]. <\/em><br><em>Use the following information if provided:<\/em>&nbsp;<br><em>Options: [options]<\/em>&nbsp;<br><em>Actions: [actions]<\/em>&nbsp;<br><em>Headers: [headers]<\/em>&nbsp;<br><em>Please note that these elements may not always be provided. If none of these<\/em><br><em> details are given, please create a rule that just detects [YOUR CONDITION].<\/em>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>You can substitute [options], [actions], and [headers] with the specific details you want to include in the rule. If you don&#8217;t want to specify any of these, just leave them blank. GPT will figure out that no extra details are supplied and will focus on creating a rule for your baseline condition, like an HTTP POST request without a User-Agent header in our example.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Understanding why\/how adversaries exploit a program&nbsp;<\/h2>\n\n\n\n<p>For instance, we came across a signature written for a <strong>w32tm.exe<\/strong>. But how can adversaries take advantage of this legitimate utility? Asking ChatGPT can be a quick method to gain preliminary insights.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"815\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-1024x815.png\" alt=\"Understanding with ChatGPT how adversaries exploit a program\u00a0 \" class=\"wp-image-5076\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-1024x815.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-300x239.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-768x611.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-1536x1223.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-370x294.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-270x215.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt-740x589.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/chatgpt.png 1568w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>You don\u2019t really need a prompt template for this one, but here\u2019s one just for good measure:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-background has-fixed-layout\" style=\"background-color:#8282822b\"><tbody><tr><td><em>Hello GPT, please explain how adversaries can exploit ____&nbsp;<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">General Tips for Using ChatGPT&nbsp;<\/h2>\n\n\n\n<p>When you&#8217;re working with ChatGPT (or any chatbot, for that matter), there are a few things you should remember:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Provide context. <\/strong>We&#8217;ve discovered that the quality of the response you get relates directly to the amount of context you provide. So don&#8217;t just throw orders at it. Instead, explain your reasoning and share as many details as possible. If GPT gets lost, it remembers the conversation history, so getting it back on track is typically swift and easy.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Filter prompts for sensitive data. <\/strong>It&#8217;s uncertain what happens to your data when you share it with ChatGPT. At the very least, it&#8217;s visible to the folks at OpenAI, so ensure you don&#8217;t accidentally reveal sensitive information during your AI chats.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stay courteous<\/strong>. Sure, it&#8217;s just a text-assistant right now, but who knows what the future holds? Maybe it&#8217;ll take over the world one day. So, let&#8217;s play it safe and be kind to it.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Over to you&nbsp;<\/h2>\n\n\n\n<p>Did we overlook a handy ChatGPT capability? Do you use it in your work? We&#8217;re genuinely curious to know, so feel free to share your experiences in the comments below. We&#8217;re sure it&#8217;ll help others streamline some of their routine tasks as well.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s pretty clear by now that AI like ChatGPT gives productivity a big push. Studies in all kinds of areas show that using chatbots ramps up efficiency, and this holds true in the realm of malware analysis as well.&nbsp; &nbsp;Not long ago, we shared thoughts on how ChatGPT falls short when it comes to analyzing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5081,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[10,34],"class_list":["post-5037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 ChatGPT Use Cases for SOC and Malware Analysts \u00a0<\/title>\n<meta name=\"description\" content=\"ChatGPT is time-saver for SOC&#039;s and malware analysts&#039; routine tasks.\u00a0Let&#039;s look at 3\u00a0use cases of ChatGPT that can help boost productivity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ChatGPT for SOC and Malware Analysis professionals: 3 Real-World Use Cases\u00a0\",\"datePublished\":\"2023-05-25T05:57:29+00:00\",\"dateModified\":\"2023-05-26T13:55:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\"},\"wordCount\":926,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\",\"name\":\"3 ChatGPT Use Cases for SOC and Malware Analysts \u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-05-25T05:57:29+00:00\",\"dateModified\":\"2023-05-26T13:55:51+00:00\",\"description\":\"ChatGPT is time-saver for SOC's and malware analysts' routine tasks.\u00a0Let's look at 3\u00a0use cases of ChatGPT that can help boost productivity.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ChatGPT for SOC and Malware Analysis professionals: 3 Real-World Use Cases\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 ChatGPT Use Cases for SOC and Malware Analysts \u00a0","description":"ChatGPT is time-saver for SOC's and malware analysts' routine tasks.\u00a0Let's look at 3\u00a0use cases of ChatGPT that can help boost productivity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ChatGPT for SOC and Malware Analysis professionals: 3 Real-World Use Cases\u00a0","datePublished":"2023-05-25T05:57:29+00:00","dateModified":"2023-05-26T13:55:51+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/"},"wordCount":926,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware analysis"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/","url":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/","name":"3 ChatGPT Use Cases for SOC and Malware Analysts \u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-05-25T05:57:29+00:00","dateModified":"2023-05-26T13:55:51+00:00","description":"ChatGPT is time-saver for SOC's and malware analysts' routine tasks.\u00a0Let's look at 3\u00a0use cases of ChatGPT that can help boost productivity.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/chatgpt-for-analysts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"ChatGPT for SOC and Malware Analysis professionals: 3 Real-World Use Cases\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5037"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5037"}],"version-history":[{"count":23,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5037\/revisions"}],"predecessor-version":[{"id":5095,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5037\/revisions\/5095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/5081"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}