Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis

Alert triage can be a very cumbersome and time consuming process for SOC teams. Our State of Security report found that 26% of respondents agree that the volume of alerts they deal with makes it difficult to keep up with addressing emergencies.

While tools like virtual sandboxes can help analysts better test and understand the severity of the threats they encounter, the process of testing and documenting results can add further tedium to an already prolonged process.

Splunk Attack Analyzer automates threat analysis

Splunk Attack Analyzer can help SOC teams automate these key threat analysis tasks by performing the actions required to fully execute an attack chain, including:

When paired with Splunk SOAR, Splunk Attack Analyzer can conduct automated analysis of identified indicators without SOC analysts having to perform manual investigative tasks.

These two products can be used together to help SOC teams tackle a variety of security use cases and reduce the time consuming staring on the alert triage process.

For this month’s edition of Splunk SOAR Playbook of the Month, we’ll be taking a look at how you can use one of our out-of-the-box playbooks for faster, simpler, and more effective dynamic analysis.

The Playbook

The Splunk Attack Analyzer Dynamic Analysis Playbook is an input playbook that accepts url link, domain or vault_id (hash) to be detonated using the Splunk Attacker (SAA) API connector. This process aligns with Mitre D3FEND’s Dynamic Analysis technique which involves executing or opening a file in a sandbox environment to see if the artifact in question is a malicious program or if it attempts to exploit another program.

Getting Started

Using the Playbook

  1. From the artifacts tab, select the artifact(s)that you want to investigate.
  2. Select the “Run Playbook” option for the nav bar on the upper right.
  3. Search for Splunk_Attack_Analyzer_Dynamic_Analysis in the search bar and then select the playbook.
  4. Click the blue “Run Playbook” button in the bottom right of the window.
  5. Running the playbook will cause Splunk Attack Analyzer to perform detonation analysis on the selected URL and vault_id values of the selected artifact(s).
  6. Once this process is completed, Splunk Attack Analyzer generates a global report, a per observable sub-report and provides a normalized score which can be viewed in Splunk SOAR.

By using this playbook, you can easily tap into the combined potential of Splunk SOAR and Splunk Attack Analyzer for more effective dynamic analysis of threats to enable more informed response and remediation efforts.

Get more Splunk SOAR Playbooks

For the latest on Splunk SOAR playbooks, please visit research.splunk.com/playbooks. Also, check out our previous blog where we discussed how to implement the Cisco Umbrella DNS Denylisting playbook.

As always, we look forward to hearing about your experience with this month’s featured playbook as well as any other playbooks you’ve been using. We’ll be back next month with more playbooks and demos, but until then, get out there and get automating!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.