Intelligence

The Intelligence page shows the intelligence available for an indicator derived from internal (Check Point's ThreatCloud, Research and Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. services) and external sources (reliable closed and open third-party feeds). On this page, you can also upload a file to Check Point's Threat Emulation Sandbox for analysis.

To view the Intelligence page, access Infinity XDRClosed Extended Detection & Response/XPRClosed Extended Prevention & Response and click Intelligence.

The Sample attackers tab shows examples of the available intelligence. Click the tiles to view the intelligence data.

You can use the Intelligence page to perform these actions:

Viewing Intelligence for Indicators

You can view the intelligence for a specific:

  • URL

  • Domain

  • MD5, SHA1 or SHA256 hash of a file

  • IP address

To view the intelligence for an indicator:

  1. Click Intelligence.

  2. Enter the indicator name(s) in the Search field and press Enter.

    The search summary table is displayed. You can search for up to 20 indicators in a single search. The indicators can be of the same type or different types.

    Item

    Description

    Risk

    The indicator's risk level based on the Check Point reputation engine.

    The higher the risk, higher the degree of maliciousness. Value ranges from 1 to 100, where 100 indicates a higher risk level and/or level of maliciousness.

    IndicatorClosed A malicious artifact, such as domain, URL, IP address, and files. IP Address

    (For URLs and Domains)

    IP address of the indicator.

    File Type

    (For files)

    Type of the file.

    For example, .exe, .dll.

    Source

    Indicates the source where you searched for the indicator.

    Examples -

    • If you searched the indicator from the Search field, then the Source is displayed as Search.

    • If you search for amazon.com and added an indicator from Research > Communicating Files, the Source is displayed as amazon.com > Communicating Files.

    Classification

    Threat classification determined by Check Point engines.

    For example, Malware or Benign.

    Malware family

    The malware family associated with the indicator, determined by Check Point engines.

    For example, Invader.

    Confidence

    The confidence level of the indicator's classification, determined by Check Point engines.

  3. To view the Intelligence Dashboard for the indicator, click the indicator row.

Note - To view (silent search) only Check Point's intelligence information, click .

Intelligence Dashboard

The Intelligence dashboard shows:

Indicator Information

The Indicator Information widget displays a high level overview of the analyzed indicator.

  • For domains and URLs, this widget shows a live screenshot of the website.

  • For files, the widget shows:

    • File hash details - MD5, SHA1, and SHA256

    • Tags - The file tags from VirusTotal. Indicates the different characteristics about the file.

      For example, the signed tag indicates that the file is signed by a valid authority.

    • First seen - Date the file was first seen.

    • Last seen - Date the file was last seen.

    • Report - Check Point Threat Emulation Report (if available).

Research

The Research widget displays technical information about the indicator.

Check Point Traffic Analysis

The Check Point Traffic Analysis widget shows a global view of the indicator's network traffic based on Check Point's global sensors. It gives a comparative view of the network traffic across different geographies. The widget shows:

Item

Description

Geolocation

The indicator's usage in different geographic locations.

  • Highlights the top 3 countries that have the highest number of hits for this indicator.

  • To view the hits in a region, hover your mouse over that region.

  • You can also zoom in and zoom out the map.

Top industries

Top 3 industries where this indicator was seen.

Distribution

Types of platforms that accessed the indicator.

For example, Web, Email.

Events in-the-wild over time

The number of events over time for the indicator.

Open Source Intelligence Tools

The Open Source Intelligence Tools widget shows the indicator information from Open Source Intelligence (OSINTClosed Open-Source Intelligence (OSINT) refers to data available from public sources.). The widget has these tabs:

Tab

Description

Check Point Research

Articles published by Check Point Research that mention this indicator and/or malware family.

Tweets

Any tweets that mention the indicator, based on Check Point Research's social media crawler.

Google

Google Search results for the indicator.

References

Web page links that contains the indicator.

Exporting the Search Summary to a CSV

  1. Click Intelligence.

  2. Enter the indicator name(s) in the Search field and press Enter.

  3. In the Search Summary table, select the indicators you want to export.

    By default, all the searched indicators are selected.

  4. At the top, click Export to CSV.

    The system downloads a .csv file in the name format Exported Summary Report Date Time.

    For example, Exported Summary Report 2022-12-08 12-33-37.csv

Copying and Removing an Indicator from the Search Summary

  1. To copy an indicator, select the indicator in the Search Summary table and at the top, click Copy Indicator.

    You can copy the indicator name and search for the indicator in any external or internal resources, or share the indicator name with other applications.

  2. To remove an indicator, select the indicator in the Search Summary table and at the top, click Remove.

Analyzing a File

You can upload a file to Check Point's Threat Emulation Sandbox for analysis. For the supported file types, see sk106123.

To analyze a file:

  1. Click Intelligence > Analyze a file.

  2. To browse and upload a file:

    1. Click Browse.

    2. In the Explorer window, select the file and click Open.

      The file is added in the summary table.

  3. To upload the file from a URL:

    1. Click Upload from URL.

    2. Enter the URL of the file and click Upload. For example, https://databases.about.com/library/samples/address.xls

      The file is added in the summary table.

  4. To refresh the summary table, click Refresh.

  5. To search for a file in the summary table, enter the file name in the Search field and press Enter.

    The summary table shows these file parameters:

    Item

    Description

    File name Name of the file.
    Type

    Type of the file.

    For example, EXE, DLL, CSV.

    Size File size.
    Hash

    File hash details:

    • MD5

    • SHA1

    • SHA256

    Upload by

    Email address of the user who uploaded the file.

    Upload date

    The date on which the file was uploaded.

    Report

    The verdict returned by Check Point Threat Emulation analysis.

    If the file was determined as malicious, the Threat Emulation report is available to download.

Investigating a File

You can view the intelligence information for a file and investigate it from the Intelligence dashboard.

To investigate about a file:

  1. Click IntelligenceAnalyze a file.

  2. Upload the file.

  3. In the summary table, select the file to investigate. Click Investigate.

    The intelligence information for the file is displayed.