Submitting a file for analysis¶
Submitting a file for analysis is easy; it can be done directly using the Assemblyline WebUI. For automation and integration you can use the REST API.
Sharing and classification¶
If your system is configured with a sharing control (TLP) or Classification configuration, the available restriction can be selected by clicking on the Classification Banner.
Selecting a file to scan¶
You can click the "Select a file to scan" or drag and drop a file to the area enclosed by the dashed line to add a file to be analyzed.
Additional submission options are available to:
- Select which service categories or specific services to use for the analysis
- Specify service configuration options (such as providing a password, or dynamic analysis timeout)
- Ignore filtering services: Bypass safelisting services
- Ignore result cache: Force re-analysis even if the same file had been scanned recently with the same service versions
- Ignore dynamic recursion prevention: Disable iteration limit on a file
- Profile current scan
- Perform deep analysis: Provide maximum deobfuscation (Highly recommended for known malicious or highly suspicious files to detect highly obfuscated content)
- Time to live: Time (in days) before the file is purged from the system
Once a file is submitted to Assemblyline, the system will automatically perform multiple checks to determine how to best process the file. One of Assemblyline's most powerful functionalities is its recursive analysis model. Malware and malicious documents often use multiple layers of obfuscation; recursive analysis allows the system to remove these layers and keep analyzing the file. The result is often a cleartext script or unpacked malware which traditional anti-virus are very effective at detecting.