
Table 7-6 Analysis Summary report sections
Item Description
1 This section displays the details of the sample file. This includes the name, hash values,
and the file size in bytes.
2 Analysis Results section on page 108. This section provides the results from the
methods used for the file and the results from those methods. This section also displays
the overall severity level for the file.
3 Analysis Environment section on page 108. This section includes the details of the
analyzer VM, properties of the file, and so on.
4 Processes analyzed in this sample. This section lists all the files that were executed
when dynamically analyzing the sample file. It also provides the reason how each file
got to be executed along with their severity score.
The Reason column indicates which other file or process created or opened this file. If
there is only one file in the sample, the reason displayed is loaded by MATD Analyzer. If
the sample file is a .zip file containing multiple files or if a file opens other files, the
reason for the first file is created by <file name> & loaded by MATD Analyzer. For the
subsequent files, the Reason column indicates all the files/processes that created it and
all the files/processes that opened it.
The Level column indicates the severity level based on dynamic analysis for each file.
•
— indicates a severity score of 0 and a threat level of informational. This
is the severity for white-listed files.
•
— indicates a severity score of 1 and a threat level of very low.
•
— indicates a severity score of 2 and a threat level of low.
•
— indicates a severity score of 3 and a threat level of medium.
•
— indicates a severity score of 4 and a threat level of high.
•
— indicates a severity score of 5 and a threat level of very high.
Click a file name to navigate to the section of the report that provides the details of the
file behavior. That is, when you click a file name, you are navigated to the section
indicated by 7 in the preceding figure.
5 Classification / threat score section on page 109. This section provides the individual
scores for the various characteristics of a typical malware.
6 Dynamic analysis section. This section displays the percentage of the file code that was
executed. For example, the file might have taken an alternative path during execution
due to which some part of the code was not executed at all. This section also provides a
brief executive behavior summary with the corresponding severity levels.
indicates a very low severity behavior.
indicates a low severity behavior.
indicates a medium severity behavior.
indicates a high severity behavior.
indicates a very high severity behavior.
7 Operations details section. This section provides detailed information on all the
operations performed by the sample file during dynamic analysis. These operations are
grouped under corresponding groups. Expand each group for the specific operations. For
example, expand Files Operations to view the files created, files deleted, files modified,
files read, directories created or opened, directories removed, and so on.
Analyzing malware
View the analysis results
7
McAfee Advanced Threat Defense 3.0.4 Product Guide
107
Comentarios a estos manuales