How often have you found yourself lost in the maze of features and options that VirusTotal Intelligence (VTI) offers? If you’re reading this, chances are you’ve been there.
But fret not, as we bring you a comprehensive guide based on the latest VTI Cheat Sheet V1.21, aimed at enhancing your cybersecurity actions.
Suspicious Documents
Macros in Recent Documents

If you want to find recently created documents with embedded macros detected by at least 5 anti-virus engines, use the query below:
(type:doc OR type:docx) tag:macros p:5+ generated:30d+
Excel Sheets with PowerShell
To search for Excel sheets that contain PowerShell scripts and have been submitted in the last 10 days:
(type:xls OR type:xlsx) tag:powershell fs:10d+
Obfuscated Documents
Looking for documents that are obfuscated? The query below will do the job:
(type:doc OR type:docx) tag:obfuscated
Behavior During Sandbox Detonation

Submission Queries
First Submission
The fs
parameter allows you to find the first time a file was submitted. For instance, to find files first submitted between a certain time range:
fs:2012-08-21 16:00:00+ fs:2012-08-21 16:59:22-
Last Submission
Use ls
to find out the last time a file was submitted to VirusTotal:
ls
Last Analysis
If you’re interested in the last time a file was analyzed, use la
:
la
Number of Submissions
To check the number of times a file has been submitted, you can use the submissions
or s
parameter:
submissions:10+ submissions:20-
Submission Sources
If you want to find the number of distinct sources that have submitted a file, use sources
:
sources
Submitter Information
To get the country code and whether the file was submitted via web or API, you can use submitter
:
submitter:websubmitter:BR
VT Analysis

General Parameters
Tags Assigned by VT
To find the tags that VirusTotal has assigned to a file, use tag
:
tag
Structure Similarity
If you’re looking for files that are structurally similar to a known file, the similar-to
query can be helpful:
similar-to:19b86fe81df05de2b4207e8eb0c3aa40
Anti-Virus Products
Number of AV Detections
To find the number of antivirus detections a file has, use positives
or p
:
positives:20+ positives:31-
TTPs (Tactics, Techniques, and Procedures)

MITRE ATT&CK Techniques
If you’re interested in samples that match techniques based on MITRE ATT&CK when detonated in a sandbox, use attack_technique
:
attack_technique:T1055
MITRE ATT&CK Tactics
To find samples that match tactics based on MITRE ATT&CK when detonated in a sandbox, use attack_tactic
:
attack_tactic:TA0003
Web-Related Parameters
Files Downloaded by a Given URL
To find files that have been downloaded by a specific URL or part of it, use itw
:
itw:"&abc=", itw:"ya.ru"
Executables and Sandbox
Entity from Sandbox Reports
If you’re looking for specific entities mentioned in sandbox reports, you can use the behavior
or behaviour_files:
query:
behavior:"explorer.exe"
File System Changes
To identify file system changes during sandbox detonation, you can use behavior_files
:
behavior_files:Crack
Executed Processes
To find out which processes were executed during the sandbox detonation, you can use behavior_processes
:
behavior_processes:"calc.exe"
Windows Registry Modifications
If you want to identify any changes made to the Windows Registry, use behavior_registry
:
behavior_registry:dc971ee5-44eb
Services and Daemons
To find information about services and daemons triggered during sandbox detonation, you can use behavior_services
:
behavior_services:TheServiceName
Sandbox Tags
If you’re interested in tags generated by sandboxes, behavior_tags
is the query you need:
behavior_tags:mysql_communication
Specific Sandbox Report
To pull a specific sandbox report, you can use sandbox_name
:
sandbox_name:VirusTotal
Traffic and Web Analysis
Web Traffic
If you want to find files that have been associated with specific web traffic, you can use the traffic
query:
traffic:"google.com"
So, there you have it—your go-to guide to mastering the VirusTotal Intelligence queries. Download the original cheat sheet here and elevate your Virustotal threat hunting game!
- https://storage.googleapis.com/vtpublic/reports/VTI%20Cheatsheet.pdf ↩︎
+ There are no comments
Add yours