Sandbox
Overview
The Sandbox API allows you to submit files for in-depth analysis within a secure, cloud-based sandbox environment. This Symantec technology meticulously examines file behavior, leveraging machine learning to identify malicious attributes. By correlating findings with the extensive Symantec Global Intelligence Network, it delivers a reliable verdict on whether a file is malicious.
Use Cases
The Sandbox API enables you to:
- Easily upload suspicious files or submit already uploaded sha256 hashes for sandboxed execution and examination.
- Obtain a clear verdict (e.g., MALWARE, CLEAN, SUSPICIOUS) based on the analysis.
- Receive comprehensive reports including static analysis findings and a summary of the file’s behavior during dynamic execution.
Requirements
- Enterprise EDR product
- All API calls require an API key with appropriate permissions
Resources
Authentication
For more details see the Carbon Black Cloud API Access Guide.Carbon Black Cloud Managed Identity and Authentication
Customize your access to the Carbon Black Cloud APIs with Role-Based Access Control; All APIs and Services authenticate via API Keys. To access the data in Carbon Black Cloud via API, you must set up a key with the correct permissions for the calls you want to make and pass it in the HTTP Headers.
Environment
Available on majority of environments; Use the Carbon Black Cloud Console URL, as described here.
API Route
Replace the {cbc-hostname} and {org_key} with the URL of your Environment and the org_key for your specific Org.
- {cbc-hostname}/ubs/v1/orgs/{org_key}/binary_analysis/{sha256}
- {cbc-hostname}/ubs/v1/orgs/{org_key}/sandbox_executions/{execution_id}
- {cbc-hostname}/ubs/v1/orgs/{org_key}/sandbox_executions
- {cbc-hostname}/ubs/v1/orgs/{org_key}/binary_analysis/{sha256}/sandbox_report
Access Level
Before you create your API Key, you need to create a "Custom" Access Level including each category:
- Unified Binary Store > Sandbox > ubs.org.sandbox, allow permission to
READ, CREATE
API Key
When creating your API Key, use the Access Level Type of "Custom" and select the Access Level you created. Details on constructing and passing the API Key in your requests are available here.
API Calls
Get Binary Analysis
Get the binary analysis summary for a given sha256
API Permissions Required
| Identity Manager | Permission (.notation name) | Operation(s) | Environment |
|---|---|---|---|
| Carbon Black Cloud | ubs.org.sandbox |
READ |
Majority of environments |
Request
GET {cbc-hostname}/ubs/v1/orgs/{org_key}/binary_analysis/{sha256}
Response Codes
| Code | Description | Content-Type | Content |
|---|---|---|---|
| 200 | Binary Analysis Found | application/json | See example below |
| 404 | Not Found | No Content |
Examples
GET https://defense.conferdeploy.net/ubs/v1/orgs/ABCD1234/binary_analysis/bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042
X-AUTH-TOKEN: "ABCDEFGHIJKLMNO123456789/ABCD123456"{
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"status": "COMPLETE",
"verdict": "CLEAN",
"last_analyzed": "2025-05-20T18:37:09.029033Z"
}Get Sandbox Report
Get the full sandbox report for a given sha256
API Permissions Required
| Identity Manager | Permission (.notation name) | Operation(s) | Environment |
|---|---|---|---|
| Carbon Black Cloud | ubs.org.sandbox |
READ |
Majority of environments |
Request
GET {cbc-hostname}/ubs/v1/orgs/{org_key}/binary_analysis/{sha256}/sandbox_report
Response Codes
| Code | Description | Content-Type | Content |
|---|---|---|---|
| 200 | Sandbox Report Found | application/json | SandboxReportResponse |
| 404 | Not Found | No Content |
Examples
GET https://defense.conferdeploy.net/ubs/v1/orgs/ABCD1234/binary_analysis/bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042/sandbox_report
X-AUTH-TOKEN: "ABCDEFGHIJKLMNO123456789/ABCD123456"{
"report": {
"verdict": "CLEAN",
"verdictType": "FULL_ANALYSIS",
"executionMetadata": {
"sampleName": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"fileType": "application/x-dosexec",
"fileSize": 213920,
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042"
},
"staticAnalysisMetadata": {
"status": "AVAILABLE",
"staticRules": [
{
"uuid": "7bcc5190-715e-4f04-8a4e-7ed895b2f0af",
"severity": "LOW_RISK",
"desc": "Submitted file has a high good reputation",
"sha256": [
"bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042"
]
},
{
"uuid": "79392242-ec03-4892-a5f3-cecc0c5580cc",
"severity": "LOW_RISK",
"desc": "Signature on the file is trusted",
"sha256": [
"bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042"
]
}
],
"staticEvents": [
{
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"reputationData": {
"band": 8,
"text": "Symantec trusts the file"
},
"detectionData": null,
"urlData": null
}
]
},
"executionSummary": {
"status": "AVAILABLE",
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"fileType": "application/x-dosexec",
"rules": [
{
"uuid": "e8470d03-50b8-420a-9500-72bc62509632",
"severity": "LOW_RISK",
"desc": "A registry key was opened",
"eventIds": [
"acfd6e12-2a4d-4329-b568-58330f10515f",
"3ca252a9-a4e6-462e-b817-2be4ff278798"
]
}
],
"filteredEvents": [
{
"id": "9ded1a83-a63f-4bd5-a00e-7826682aceaf",
"generatedTimeInMs": "1747762988375",
"summary": "[38] dns.msftncsi.com",
"icdEventId": 42,
"icdEventDesc": "URL Reputation",
"icdActivityId": 4,
"icdActivityDesc": "Logged"
},
{
"id": "83aaf398-73ec-416a-97b9-0c8d2ac97367",
"generatedTimeInMs": "1747762988375",
"summary": "[38] dns.msftncsi.com",
"icdEventId": 42,
"icdEventDesc": "URL Reputation",
"icdActivityId": 4,
"icdActivityDesc": "Logged"
},
{
"id": "acfd6e12-2a4d-4329-b568-58330f10515f",
"generatedTimeInMs": "1747765938995",
"summary": "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SafeBoot\\Option\\",
"icdEventId": 8005,
"icdEventDesc": "Registry Key Activity",
"icdActivityId": 3,
"icdActivityDesc": "Opened"
},
{
"id": "3ca252a9-a4e6-462e-b817-2be4ff278798",
"generatedTimeInMs": "1747765939009",
"summary": "HKEY_USERS\\S-1-5-21-1839595590-1967928825-12345678-1234\\Control Panel\\Desktop\\MuiCached\\MachineLanguageConfiguration\\",
"icdEventId": 8005,
"icdEventDesc": "Registry Key Activity",
"icdActivityId": 3,
"icdActivityDesc": "Opened"
},
{
"id": "087ad845-8a62-4460-8ba9-b1a539a02946",
"generatedTimeInMs": "1747765939042",
"summary": "[9144] c:\\bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042.exe",
"icdEventId": 8001,
"icdEventDesc": "Process Activity",
"icdActivityId": 2,
"icdActivityDesc": "Terminated"
},
{
"id": "9236c73b-af38-475d-8d96-1977d2f926ba",
"generatedTimeInMs": "1747765939946",
"summary": "[90] wpad.midas.local",
"icdEventId": 42,
"icdEventDesc": "URL Reputation",
"icdActivityId": 4,
"icdActivityDesc": "Logged"
},
{
"id": "30cbf7dd-6fc4-4ba6-8b5e-20c6bd4227b0",
"generatedTimeInMs": "1747765939946",
"summary": "[90] wpad.midas.local",
"icdEventId": 42,
"icdEventDesc": "URL Reputation",
"icdActivityId": 4,
"icdActivityDesc": "Logged"
}
],
"executionArtifacts": {
"pcap": {
"artifact": {
"uri": "https://example-integration-infra-analysis-results.s3.amazonaws.com/sandbox-reports/<truncated>",
"expiryTimeInMs": "1747855782416",
"fileType": "application/vnd.tcpdump.pcap"
},
"status": "AVAILABLE"
},
"screenShots": {
"artifact": {
"uri": "https://example-integration-infra-analysis-results.s3.amazonaws.com/sandbox-reports/<truncated>",
"expiryTimeInMs": "1747855782417",
"fileType": "image/png"
},
"status": "AVAILABLE"
},
"sepTraces": {
"status": null,
"artifact": null
}
}
}
}
}Create Sandbox Execution
Trigger a sandbox execution by specifying an existing binary in the Carbon Black Cloud or upload your own binary.
API Permissions Required
| Identity Manager | Permission (.notation name) | Operation(s) | Environment |
|---|---|---|---|
| Carbon Black Cloud | ubs.org.sandbox |
READ |
Majority of environments |
Request
POST {cbc-hostname}/ubs/v1/orgs/{org_key}/sandbox_executions
Request Body
{
"sha256": <string>"
}
Body Schema
Application/JSON
| Field | Definition | Data Type | Values |
|---|---|---|---|
sha256 |
The sha256 for a binary previously uploaded to the Carbon Black Cloud | string |
Response Codes
| Code | Description | Content-Type | Content |
|---|---|---|---|
| 200 | Execution triggered successfully | application/json | Execution |
| 400 | Execution Creation Error | No Content | |
| 413 | File is too large | text/html | |
| 415 | Unsupported Media Type | No Content | |
| 429 | Too many requests | No Content |
Examples
POST https://defense.conferdeploy.net/ubs/v1/orgs/ABCD1234/sandbox_executions
X-AUTH-TOKEN: "ABCDEFGHIJKLMNO123456789/ABCD123456"
Content-Type: "application/json"{
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042"
}{
"id": "0176ba23-7908-40b6-a001-e014c1b4d44c",
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"status": "IN_PROGRESS",
"last_submitted": "2025-05-21T18:37:44.923027014Z",
"file_name": "microsoftedgeupdate.exe",
"submitter": "example",
"verdict": null,
"last_analyzed": null
}Get Sandbox Executions
Get the history of all sandbox executions for an org
API Permissions Required
| Identity Manager | Permission (.notation name) | Operation(s) | Environment |
|---|---|---|---|
| Carbon Black Cloud | ubs.org.sandbox |
READ |
Majority of environments |
Request
GET {cbc-hostname}/ubs/v1/orgs/{org_key}/sandbox_executions
Query Parameter
| Parameter | Required | Description | Values | Default |
|---|---|---|---|---|
start |
No | Row to start from when retrieving results | 0 |
|
rows |
No | Number of rows to retrieve | 10 |
|
sort_field |
No | Field to sort results by | ||
sort_order |
No | Direction to sort by | ASC, DESC |
Response Codes
| Code | Description | Content-Type | Content |
|---|---|---|---|
| 200 | OK | application/json | See example below |
Examples
GET https://defense.conferdeploy.net/ubs/v1/orgs/ABCD1234/sandbox_executions
X-AUTH-TOKEN: "ABCDEFGHIJKLMNO123456789/ABCD123456"{
"results": [
{
"id": "0176ba23-7908-40b6-a001-e014c1b4d44c",
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"status": "IN_PROGRESS",
"last_submitted": "2025-05-21T18:37:44.923027Z",
"file_name": "microsoftedgeupdate.exe",
"submitter": "example",
"verdict": null,
"last_analyzed": null
},
{
"id": "61b19b59-6329-4545-9296-65f257f6cc37",
"sha256": "774459214dfd435d37baa2cd43c034e3ea771d0a638979c09832fcad25effc4e",
"status": "COMPLETE",
"last_submitted": "2025-05-20T20:09:47.396656Z",
"file_name": "backgroundtaskhost.exe",
"submitter": "example2",
"verdict": null,
"last_analyzed": "2025-05-20T14:34:30.746020Z"
},
{
"id": "00fb1900-542c-4d53-a139-aae0a60ad90b",
"sha256": "eb71ea69dd19f728ab9240565e8c7efb59821e19e3788e289301e1e74940c208",
"status": "COMPLETE",
"last_submitted": "2025-05-20T18:49:26.188597Z",
"file_name": "cmd.exe",
"submitter": "example2",
"verdict": "CLEAN",
"last_analyzed": "2025-05-20T18:51:07.650818Z"
}
],
"num_available": 3
}Get Execution by ID
Get the details for a specific sandbox execution
API Permissions Required
| Identity Manager | Permission (.notation name) | Operation(s) | Environment |
|---|---|---|---|
| Carbon Black Cloud | ubs.org.sandbox |
READ |
Majority of environments |
Request
GET {cbc-hostname}/ubs/v1/orgs/{org_key}/sandbox_executions/{execution_id}
Response Codes
| Code | Description | Content-Type | Content |
|---|---|---|---|
| 200 | Execution Found | application/json | Execution |
| 404 | Not Found | No Content |
Examples
GET https://defense.conferdeploy.net/ubs/v1/orgs/ABCD1234/sandbox_executions/0176ba23-7908-40b6-a001-e014c1b4d44c
X-AUTH-TOKEN: "ABCDEFGHIJKLMNO123456789/ABCD123456"{
"id": "0176ba23-7908-40b6-a001-e014c1b4d44c",
"sha256": "bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042",
"status": "COMPLETE",
"last_submitted": "2025-05-21T18:37:44.923027Z",
"file_name": "microsoftedgeupdate.exe",
"submitter": "8H9KH636JG",
"verdict": "CLEAN",
"last_analyzed": "2025-05-21T18:39:26.638294Z"
}Field Definitions
Execution
| Field | Definition | Data Type | Values |
|---|---|---|---|
id |
Unique identifier for the execution. | string | |
status |
Current status of the sandbox execution. | string | IN_PROGRESS, ERROR, COMPLETE |
last_submitted |
Timestamp of the last submission for this execution. | ISO8601 timestamp | |
file_name |
Name of the file submitted for execution. | string | |
submitter |
Identifier of the entity that submitted the execution. | string | |
verdict |
Verdict of the analysis. | string | MALWARE, CLEAN, SUSPICIOUS |
last_analyzed |
Timestamp of when the analysis was last completed. | ISO8601 timestamp |
SandboxReportResponse
| Field | Definition | Data Type | Values |
|---|---|---|---|
report |
The sandbox report | SandboxReport | Schema |
SandboxReport
| Field | Definition | Data Type | Values |
|---|---|---|---|
verdict |
The overall verdict of the sandbox analysis. | string | MALWARE, CLEAN, SUSPICIOUS |
verdictType |
The type of analysis that led to the verdict. | string | FULL_ANALYSIS, INTELLIGENCE |
executionMetadata |
Metadata related to the execution of the sample. | ExecutionMetadata | Schema |
staticAnalysisMetadata |
Metadata from the static analysis of the sample. | StaticAnalysisMetadata | Schema |
executionSummary |
A summary of the dynamic execution analysis. | ExecutionSummary | Schema |
ExecutionMetadata
| Field | Definition | Data Type | Values |
|---|---|---|---|
sampleName |
The name of the sample file. | string | |
fileType |
The MIME type of the sample file. | string | |
fileSize |
The size of the sample file in bytes. | integer | |
sha256 |
The SHA256 hash of the sample file. | string |
StaticAnalysisMetadata
| Field | Definition | Data Type | Values |
|---|---|---|---|
staticRules |
A list of static analysis rules that were triggered. | list | Schema |
staticEvents |
A list of events observed during static analysis. | list | Schema |
StaticRule
| Field | Definition | Data Type | Values |
|---|---|---|---|
uuid |
Unique identifier for the static rule. | string | |
desc |
Description of the static rule. | string | |
sha256 |
SHA256 hash(es) associated with the rule trigger. | list | |
severity |
Severity level of the triggered rule. | string | MALICIOUS, SUSPICIOUS, LOW_RISK |
StaticEvent
| Field | Definition | Data Type | Values |
|---|---|---|---|
sha256 |
SHA256 hash of the file associated with this static event. | string | |
reputationData |
Reputation information related to the static event. | ReputationData | Schema |
detectionData |
Detection information related to the static event. | DetectionData | Schema |
urlData |
URL information related to the static event. | array | Schema |
ReputationData
| Field | Definition | Data Type | Values |
|---|---|---|---|
band |
Numerical reputation score or band. | integer | |
text |
Textual description of the reputation. | string |
DetectionData
| Field | Definition | Data Type | Values |
|---|---|---|---|
threatNames |
A list of names for identified threats. | array |
UrlData
| Field | Definition | Data Type | Values |
|---|---|---|---|
url |
The URL observed. | string | |
urlCategory |
Category information for the URL. | array | |
detected |
Indicates if the URL was detected as part of the analysis. | boolean | true, false |
ExecutionSummary
| Field | Definition | Data Type | Values |
|---|---|---|---|
status |
Status of the execution summary. | string | AVAILABLE, NOT_GENERATED, ERROR |
sha256 |
SHA256 hash of the executed file. | string | |
fileType |
MIME type of the executed file. | string | |
rules |
Rules triggered during dynamic execution. | Rule | Schema |
filteredEvents |
A list of filtered events from the dynamic execution. | array | Schema |
executionArtifacts |
Artifacts generated during execution. | executionArtifact | Schema |
Rule
| Field | Definition | Data Type | Values |
|---|---|---|---|
uuid |
Unique identifier for the rule. | string | |
desc |
Description of the rule. | string | |
severity |
Severity level of the rule. | string | MALICIOUS, SUSPICIOUS, LOW_RISK |
eventIds |
List of event IDs associated with this rule. | array |
FilteredEvent
| Field | Definition | Data Type | Values |
|---|---|---|---|
id |
Unique identifier for the filtered event. | string | |
generatedTimeInMs |
Timestamp when the event was generated, in milliseconds. | integer | |
summary |
A summary of the event. | string | |
icdEventId |
ICD (Integrated Cyber Defense) event ID. | integer | |
icdEventDesc |
Description of the ICD event. | string | |
icdActivityId |
ICD activity ID. | integer | |
icdActivityDesc |
Description of the ICD activity. | string |
ExecutionArtifact
| Field | Definition | Data Type | Values |
|---|---|---|---|
pcap |
Network traffic capture (PCAP) artifact. | PcapArtifact | Schema |
screenShots |
Screenshots taken during execution. | ScreenShotArtifact | Schema |
sepTraces |
SEP (Symantec Endpoint Protection) traces. | SepTraceArtifact | Schema |
Artifact
| Field | Definition | Data Type | Values |
|---|---|---|---|
uri |
URI to download the artifact. | string | |
expiryTimeInMs |
Timestamp when the download URI expires, in milliseconds. | integer | |
fileType |
MIME type of the artifact. | string |
PcapArtifact
| Field | Definition | Data Type | Values |
|---|---|---|---|
artifact |
Details of the PCAP artifact. | Artifact | Schema |
status |
Status of the PCAP artifact generation. | string | AVAILABLE, NOT_GENERATED, ERROR |
ScreenShotArtifact
| Field | Definition | Data Type | Values |
|---|---|---|---|
artifact |
Details of the screenshot artifact. | Artifact | Schema |
status |
Status of the screenshot artifact generation. | string | AVAILABLE, NOT_GENERATED, ERROR |
SepTraceArtifact
| Field | Definition | Data Type | Values |
|---|---|---|---|
artifact |
Details of the SEP trace artifact. | Artifact | Schema |
status |
Status of the SEP trace artifact generation. | string | AVAILABLE, NOT_GENERATED, ERROR |
Last modified on October 15, 2025