Cmdlets
Get-FalconReport
Search for Falcon Intelligence Sandbox reports. Permissions:Sandbox (Falcon Intelligence): Read
Report identifier (format:
<sha256>_<environment_id>)Falcon Query Language expression to limit results
Property and direction to sort results
Maximum number of results per request (1-5000)
Position to begin retrieving results
Return a summary version
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconSubmission
Search for Falcon Intelligence Sandbox submissions. Permissions:Sandbox (Falcon Intelligence): Read
Submission identifier (format:
<sha256>_<environment_id>)Falcon Query Language expression to limit results
Property and direction to sort results
Maximum number of results per request (1-5000)
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconSubmissionQuota
Retrieve monthly Falcon Intelligence Sandbox submission quota. Permissions:Sandbox (Falcon Intelligence): Read
Example
New-FalconSubmission
Submit a sample to the Falcon Intelligence Sandbox. Permissions:Sandbox (Falcon Intelligence): Write
SHA256 values are retrieved from files uploaded using
Send-FalconSample. Files must be uploaded before they can be submitted to the sandbox.Analysis environment. Valid values:
androidmacOS_10.15ubuntu16_x64,ubuntu20_x64win7_x64,win7_x86win10_x64,win11_x64
Auto detect environment
A webpage or file URL
Runtime script for sandbox analysis. Valid values:
defaultdefault_maxantievasiondefault_randomfilesdefault_randomthemedefault_openie
Browser to use with URL submission
Whether sandbox detonation is interactive
Command line script passed to the submitted file at runtime
A custom date to use in the analysis environment (format: YYYY-MM-DD)
A custom time to use in the analysis environment (format: HH:MM)
Auto-filled for Adobe or Office files that prompt for a password
Network settings to use in the analysis environment. Valid values:
default, offline, simulated, torRoute traffic via TOR
Tags to categorize the submission
Send email notification
Submission name
Agent identifier
SHA256 hash value
Example
Receive-FalconArtifact
Download an artifact from a Falcon Intelligence Sandbox report. Permissions:Sandbox (Falcon Intelligence): Read
Artifact identifier values can be retrieved for specific Falcon Intelligence Sandbox reports using
Get-FalconReport.Destination path
Artifact identifier (64-character hex)
Overwrite an existing file when present
Example
Receive-FalconMemoryDump
Download a memory dump or extracted strings from a Falcon Intelligence Sandbox report. Permissions:Sandbox (Falcon Intelligence): Read
Destination path (must end with .gzip)
Binary content dump identifier (64-character hex)
Extracted string identifier (64-character hex)
Hex dump identifier (64-character hex)
Overwrite an existing file when present
Example
Remove-FalconReport
Remove a Falcon Intelligence Sandbox report. Permissions:Sandbox (Falcon Intelligence): Write
Report identifier
Example
Sandbox Analysis Workflow
Analysis Environments
Windows Environments
Windows Environments
- win11_x64: Windows 11 64-bit (ID: 140)
- win10_x64: Windows 10 64-bit (ID: 160)
- win7_x64: Windows 7 64-bit (ID: 110)
- win7_x86: Windows 7 32-bit (ID: 100)
macOS Environments
macOS Environments
- macOS_10.15: macOS Catalina (ID: 400)
Linux Environments
Linux Environments
- ubuntu20_x64: Ubuntu 20.04 64-bit (ID: 310)
- ubuntu16_x64: Ubuntu 16.04 64-bit (ID: 300)
Mobile Environments
Mobile Environments
- android: Android environment (ID: 200)
Advanced Submission Options
Action Scripts
Control sandbox behavior:
default: Standard executiondefault_maxantievasion: Maximum anti-evasion techniquesdefault_randomfiles: Randomized file environmentdefault_randomtheme: Randomized visual themedefault_openie: Use Internet Explorer
Network Settings
Control network access:
default: Full internet accessoffline: No network connectivitysimulated: Simulated network responsestor: Route traffic through TOR
URL vs File Submissions
Analyzing Results
Complete Analysis Workflow
Best Practices
Related Resources
Sample Uploads
Upload samples to CrowdStrike
MalQuery
Hunt for similar malware samples
IOC Management
Create IOCs from analysis results
Falcon Intelligence
Access threat intelligence reports