Product Updates for June 2018

Written by Or Fridman

    Share article
    FacebookTwitterLinkedInRedditCopy Link

    Top Blogs

    In this blog post we’d like to share with you some details about our latest cool developments.

    New User Interface:

    We’ve recently added to our product, support for Dynamic Execution and Static Extraction and we wanted our user interface to reflect these additions.
    The “Tree View” on the left panel of the page, reflects the original file and the files that were extracted from it. Clicking on each node, will reveal the relevant analysis for every sub analysis.
    This new user interface enables our users to see the full analysis in the right context together, without having to jump between pages. In addition, it will enable us to easily add more sections like String reuse (coming soon!) and to significantly enrich the context/information for each analysis.

    New User Interface

    Figure 1: the new user interface for a packed file (click to enlarge)

    Installers Analysis:

    There are various reports about installers used to disperse malware. For example, the NSIS installer (Nullsoft Scriptable Install System) was used in several ransomware campaigns. In addition, looking at uploads from our customers and community edition, as well as data from other reports, convinced us it was time to address this phenomenon.

    Now, when Intezer Analyze detects code similarities to a certain installer, it will automatically extract the files (recursively, so that no file is missed). Then, it will analyze them using our Code Intelligence™ technology to provide a much deeper analysis of the uploaded file and inspect every piece of code in the extracted files. Other non-executable files, are analyzed using other sources, to deliver a picture of what’s inside the compressed installer file.
    You can see some very interesting results here:

    Intezer Analyze

    Figure 2: Analysis of compressed installer file (click to enlarge)

    After extracting the WinRAR.SFX installer, 2 files we discovered:
    . Executable file (reader_sl.exe) that is classified as APT 29
    . PDF file (5463.pdf)


    At Intezer, we believe in API-driven development, to ensure our customers benefit from simple integration with other products.
    We’ve recently enabled some valuable integrations for our customers and for the community:

    Splunk Integration:

    APT 29
    Splunk is one of the most widely deployed SIEM products in the world. One of the main challenges enterprises face in their SOC, is the ever-growing number of alerts in their SIEM system. By integrating Intezer with Splunk, enterprises will benefit from an automatic analysis for every alert (based on hash or file), as well as an enrichment of each alert with classification of the file.

    Classifying files into threat categories provides the enterprise with a distinct advantage: the additional layer of malware classification enables Incident Response teams to effectively prioritize alerts. For example, a nation-sponsored attack, that requires immediate attention and eradication will be given priority over an instance of generic malware.

    In order to download this plugin, please go to:
    We’d also like to take this opportunity to thank Mickey Perre from Splunk (@MickeyPerre) for his initiative to build this plugin.

    Demisto Integration:

    Demisto Integration
    Demisto is a Security Orchestration, Automation and Response (SOAR) Platform that combines orchestration, incident management and interactive investigation into a seamless experience. Demisto’s orchestration engine automates security product tasks and weaves in human analyst tasks and workflows.
    By integrating Demisto and Intezer, it’s possible to automate incident-response processes such as investigating suspicious files (or hashes) with Intezer Analyze to get an almost immediate response for incidents, with the relevant detection and classification from Intezer.

    We’d also like to take this opportunity to thank Nitzan Peretz from Demisto for his initiative to build this plugin.

    While it’s not for enterprise purposes, it’s important for us also to contribute to community projects. MalScanBot is an initiative by Omri Moyal (@GelosSnake), to scan malware in Telegram bot. It’s possible to get Intezer’s detection through this interface.

    There are many additional integration options and we’re already working on some of them. If you would like to suggest an integration with our product, please contact us at:

    Analyses History:

    Another recent addition to our product is the ability to browse your submitted files through the “Analyses History” page.
    On this page, you can browse through the results of daily analyses, dive into a specific analysis result, export analyses results to a CSV file and more.


    Figure 4: Sample of Analyses History (on a specific date)

    Product Version:

    As part of the data we display for every file that shares code with the uploaded sample, you will now be able to also see the product version data. This feature applies to trusted software (like WinSCP) and libraries (like OpenSSL in the example below). Each product version shares a lot of code with previous versions. Using this new information, you can further understand the context of the code similarities, know the exact version of library/software your uploaded sample is most similar to, and even see the beautiful evolution of a software:


    Figure 5: Product version data is now part of the file data display


    We’re constantly working on interesting developments and we have some more exciting product updates coming soon. As always, we’re really happy to get your feedback, we learn from it, value the time you take to provide it and we are doing our best to address your requests. Contact us at:

    Or Fridman

    Or has 10 years of experience working in technology development and product management. As director of product at Intezer he oversees the development and execution of the company's product roadmap. Or began his career in cybersecurity through a programming course in the Israeli Defense Force (IDF) and later served as a developer and product manager for the unit. Prior to joining Intezer Or was a product manager at CyberArk

    Generic filters
    Exact matches only
    Search in title
    Search in content
    Search in excerpt