Automating complex threat analysis with Splunk Attack Analyzer
You are a security analyst or SOC team member facing increasing volumes of sophisticated phishing and malware threats that overwhelm manual investigation efforts. Limited visibility, complex obfuscation techniques, and evolving attack methods make it difficult to quickly and accurately analyze threats, leading to longer dwell times and resource strain. You need a faster, less manual way to analyze complex threats.
Prerequisites
- Access to Splunk Attack Analyzer.
- Familiarity with your email gateway or security infrastructure to enable suspicious email submission.
- API access credentials if you plan to automate submissions or integrate with other tools.
- Integration with Splunk Enterprise Security for automated submission and case management (optional but recommended).
How to use Splunk software for this use case
Splunk Attack Analyzer automates the analysis of suspected malware and phishing threats by safely running each step of the attack chain to reach a final verdict of phish, malware, or spam. It reduces manual analyst effort, improves investigation consistency, and integrates seamlessly with Splunk Enterprise Security and Splunk SOAR for end-to-end threat analysis and response. Using AI-powered, layered analysis that mimics human investigation, Splunk Attack Analyzer can reduce investigations that typically take hours down to minutes, providing faster, more actionable insights.
This article guides you through practical steps to onboard and use Splunk Attack Analyzer to automate the analysis of phishing or malware threats. Key use cases for Splunk Attack Analyzer include:
- Email gateway augmentation: Serve as a secondary analysis source for suspicious emails that bypass primary filters.
- Threat intelligence integration: Leverage Cisco Talos and other embedded threat intelligence sources for enriched context.
- Interactive sandboxing: Manually interact with sandboxes across regions and user-agent contexts for deeper investigation.
- Handling complex obfuscation: Automatically overcome obfuscation layers such as blurred images, password-protected documents, and QR codes that traditional tools often miss.
1. Get data into Splunk Attack Analyzer
If you haven't already, follow the steps to Get data into Splunk Attack Analyzer. You can integrate a variety of different data sources, for example:
- Configure your email gateway’s suspicious email submission button to forward suspicious emails or attachments to Splunk Attack Analyzer.
- Configure Splunk Enterprise Security to automatically send suspicious payloads to Splunk Attack Analyzer via API submissions.
- Manually submit malware packets or phishing URLs through the Splunk Attack Analyzer API or UI.
2. Select a submission to explore
Open Splunk Attack Analyzer and select the entry for the submission you're interested in exploring in Recent Submissions, or select the Recent tab and select the submission you want to review. You can also search for a specific submission using the Search tab. To learn more about searching in Splunk Attack Analyzer, see Search in Splunk Attack Analyzer.

3. Explore top-level submission details
Top-level submission details include information like the consolidated threat score, verdict (phish, malware, or spam) and individual scores for specific resources analyzed by the Splunk Attack Analyzer engines. Scores are on a 0 to 100 scale and are returned by the engine after it has completed analysis for a given resource. A score of 0 indicates no evidence of maliciousness, while a score of 100 indicates a high evidence of maliciousness. Scores also have a color associated with the number ranges: 0-29 is green, 30-69 is yellow, 70-100 is red.
The score listed in the top-level job details is the consolidated score, or the highest score given to the URL or file from any of the Splunk Attack Analyzer engines. In the example below, the Consolidated score is 100, so it definitely warrants further investigation.

4. Review resources
All the resources associated with the job, such as URLs, attachments, or executable files, have individual scores that are returned by specific analytics engines. In the example below, the left-hand menu shows all of the resources and analytics engines used. MobileActivation.eml shows a high score generated by the Email Analyzer; a PDF attachment shows a high score generated by Static Doc Analysis; and an associated URL shows a high score generated by the Web Analyzer. Click into any of these to explore further.

Email Analyzer
The Email Analyzer examines suspicious emails to gather context and assess threat potential. It does this by:
- Analyzing email headers and sender information to detect suspicious origins or spoofing attempts
- Inspecting attachment metadata, including file types and properties
- Extracting activation codes and passwords required to progress through the attack chain
- Assigning a threat score reflecting the likelihood of malicious content
The Analyzer looks at message metadata just as a human analyst would, extracting relevant text for you to explore. It also identifies suspicious senders and attachments, flagging them for further analysis.
You can scroll further down to see the email itself. In the example below, this email contains an activation code and a PDF. Traditional analysis tools would typically not recognize any obvious malicious signatures, but the threat score that Splunk Attack Analyzer has assigned to this reflects potential risk to help prioritize investigation.

Static Doc Analysis
You can use Static Doc Analysis to dig deeper into documents associated with the job, even those that might be obfuscated or password-protected. Splunk Attack Analyzer analyzes documents by:
- Decrypting password-protected PDFs using access codes found in the email or extracted via OCR
- Extracting embedded QR codes and other hidden elements within documents
- Using Optical Character Recognition (OCR) to read text and images inside the document, capturing information that traditional scanners might miss
- Leveraging the malware threat reversing agent to break down suspicious scripts in seconds
You can explore all of the signatures and metadata associated with the document, or scroll down to see a preview of the fully decrypted document. In the example below, the PDF attachment was password protected; however, Splunk Attack Analyzer used the password found in the email to decrypt it. OCR then extracted a QR code embedded in the PDF, which is critical because QR codes can redirect users to malicious sites. The decrypted document itself appears benign superficially, but the embedded QR code is a key threat vector.

When a static doc has been analyzed, the malware threat reversing agent leverages AI analysis to break down malicious scripts contained within the document. In the screenshot below, the Summary tab shows an example of a technical breakdown of scripts and payloads, with snippets of relevant code to review.

The MITRE ATT&CK TTPs tab links you straight to relevant TTPs, and the IOCs and Recommendations tab provides full details on indicators of compromise (IOCs) such as hashes, domains, IP addresses, and suspicious processes, as well as suggested next steps for you to follow.

Web Analyzer
The Web Analyzer inspects web pages linked from suspicious emails or QR codes for malicious content, providing a comprehensive view of the web-based attack components that traditional tools might miss. It does this by:
- Scanning QR codes extracted from documents to reveal embedded URLs
- Analyzing these URLs for obfuscation techniques such as blurred images or base64 encoding
- Unblurring images that attackers use to hide malicious content
- Checking URLs against threat intelligence sources, primarily Cisco Talos, but also others like Google URL
- Inspecting web forms for credential harvesting or other malicious behaviors
- Detecting phishing kits, malicious login pages, and other indicators of compromise
For any web resource analyzed, you can explore all of the detected signatures in detail before scrolling down to Screenshots to see the web content in context. In the example below, the QR code leads to URLs that were initially blurred to evade detection. Splunk Attack Analyzer unblurred the login pages and identified that they lead to fake Microsoft login pages that are part of known phishing kits, indicating attempted credential theft.

Static File Analysis
Static File Analysis is used to safely download and analyze the final executable payloads, such as malware binaries, after overcoming obfuscation layers. It does this by:
- Unzipping compressed payloads to access executable files
- Detecting malware families, behaviors, and indicators such as process injection, persistence mechanisms, and data harvesting
In the example below, the executable has been identified as probably malicious.

Sandboxing
Splunk Attack Analyzer contains a number of sandbox environments, enhanced with YARA rules and ClamAV antivirus scanning, to detect malicious signatures in payloads.
In the example below, after decrypting and unpacking, the payload was identified as Agent Tesla XOR malware. The sandbox detected behaviors like creating hidden processes, injecting code, and attempting to remove evidence. The accompanying analysis provides detailed metadata about the executable and its actions. This stage confirms the malicious nature of the payload and provides actionable intelligence for response.

5. Begin remediation
At this point, you might be ready to begin taking remediation steps. You can use tools like the Splunk Attack Analyzer malware threat reversing agent or integration with Splunk SOAR to automate your response actions. When Splunk Attack Analyzer is integrated with Splunk SOAR, analysts can automate actions such as blocking IPs, quarantining emails, or updating threat intelligence feeds. See Splunk Help for detailed guidance on integrating these two tools.
Next steps
The content in this article comes from a .Conf 25 session, one of the thousands of Splunk resources available to help users succeed. In addition, these resources might help you understand and implement this guidance:
- Splunk Product Brief: Splunk Attack Analyzer
- Splunk Guided Tour: Splunk Attack Analyzer

