get_dropped_info
Retrieve metadata and detection indicators for malicious files dropped during a Joe Sandbox analysis to identify security threats and suspicious behavior.
Instructions
Retrieve metadata for files dropped in a completed analysis, along with their associated detection indicators.
This tool returns information about dropped files for a specific sandbox run of an analysis.
Each result includes relevant metadata and detection indicators where available.
Args:
webid (required): The submission ID of the analysis.
run (optional, default = 0): The index of the analysis run to inspect.
Use 0 for the first run, 1 for the second, etc.
only_malicious_elements (default: True): If True, returns only dropped files explicitly classified as malicious by the sandbox engine.
only_malicious_indicators (default: True): If True, limits the returned indicators to those considered clearly malicious by the detection logic.
This excludes low-impact behavioral signals and focuses on indicators with a high likelihood of malicious intent or confirmed threat classification.
If False, all observed indicators are included regardless of their severity.
Returns:
A dictionary with:
- webid: The analysis ID.
- malicious_dropped_files: A list of dropped files marked as malicious, each with:
- filename
- sha256
- size
- type
- process (originating process)
- dump_name (sandbox-internal reference)
- category (e.g., "dropped", "modified")
- indicators: List of triggered detection rules, if any. Each entry includes:
- desc: Description of the matched detection rule.
- data: Matched content or signature.
- source: The detection subsystem responsible (e.g. Suricata, Sigma, global traffic etc.).
- impact: Either "high" or "low", indicating the severity or confidence of the detection.
High-impact indicators are strongly associated with malicious behavior or confirmed threats.
Low-impact indicators reflect general behavior or environmental traits that may not be malicious on their own.
- count: Total number of malicious dropped files found
Notes:
- Empty Array returned if no dropped file was gathered during the analysis
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| webid | Yes | ||
| run | No | ||
| only_malicious_elements | No | ||
| only_malicious_indicators | No |