Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Submitting suspicious or undetected virus for file analysis to Technical Support using Threat Query Assessment

    • Updated:
    • 5 Oct 2015
    • Product/Version:
    • Control Manager 6.0
    • Deep Security 8.0
    • Deep Security 9.5
    • Deep Security 9.6
    • Endpoint Encryption 5.0
    • OfficeScan 10.6
    • OfficeScan 11.0
    • ServerProtect for Linux 3.0
    • ServerProtect for Microsoft Windows/Novell Netware 5.7
    • ServerProtect for Microsoft Windows/Novell Netware 5.8
    • ServerProtect for Network Appliance Filer 5.61
    • ServerProtect for Network Appliance Filer 5.8
    • Worry-Free Business Security Standard/Advanced 7.0
    • Worry-Free Business Security Standard/Advanced 8.0
    • Worry-Free Business Security Standard/Advanced 9.0
    • Platform:
    • Others N/A
Summary

This is article provides a guide on how to submit files to Trend Micro for analysis using the online Threat Query Assessment.

Details
Public

If you encounter a virus or malware or if you suspect that there is a threat affecting one of your machines or your entire network, you can minimize the waiting time and fast-track the resolution of your case using Trend Micro's Threat Query Assessment.

 
For Premium customers, submit the sample or inquiry using Premium Support Online or contact your Premium Support representative.
  1. Access the Submit a Support Case website.
  2. On the Issue Category dropdown, select Files to Submit for Analysis.

    files to submit for analysis

  3. On the Description section, provide a brief description of the file you are sending.
  4. Click Browse to locate and upload the sample file you want to submit.

    Browse and upload files

    Things to keep in mind before uploading files to avoid delay in processing the files:

    • Use single layer of compression
    • Only ZIP or RAR extensions are accepted
    • Encrypt the sample file with the password “virus”
    • Files should only be up to 50 MB in size
  5. Wait for the upload to complete and then click Next.
  6. Provide all the required product and system information (*) and click Next.

    Enter product information

  7. Fill out the all the required customer information (*) and click Submit.

    Provide customer information

    A confirmation will appear stating that you will receive an email with your service request number.

    Confirmation that the file was successfully submitted

  8. When you receive your confirmation email, copy the Reference ID from the email notification and click the File Analysis Results link.

    Go to the View Analysis Results page

  9. On the Threat Service Request window, enter the reference number you copied and click View Results.

    View the analysis results

    The Results page may show the following results depending on the analysis of the file you submitted:

    Normal – tagged as not malicious
    Malicious – confirmed malicious
    Undecided – needs further analysis
    Unknown password – password you used in the zip file is not recognized by Trend Micro (You did not use “virus” as the password)

    Below is a sample Results page that shows the file submitted was already submitted before and appears as malicious.

    Sample analysis of submitted malicious file

    Click image to enlarge.

Submit a support case to Technical Support if you want files that are found suspicious to be analyzed further.

  1. On the Threat Service Request page, select the files that are for further analysis and then click the Open a Support Case button.

    Opening a support case

     
    The Generate a Custom ATTK Package feature can be used to collect the files. This has a higher Threat Score or it uses more aggresive patterns when analyzing sample files. This feature, however, does not clean the files.
  2. On the Select Request Type drop-down, select Submit File for Further Analysis.

    Send file to be analyzed further

     
    You can submit one Service Request with multiple request types for your threat service analysis results. Any follow up action related to the same Reference ID should be serviced under that Service Request.
    In case the Issue Category is not applicable to the submission, the error message "There are now records applicable for the selected request type" will appear.
  3. Select the files you’d like to re-analyze or needs further follow up action and then click Add Files.

    Re-analyze files

  4. Once the files appear at the bottom of the page, click Submit Case.

    Submit a case

    A confirmation message will appear and an email will be sent to you with your Support Case number.

    Confirmation message that submission is successful

Premium
Internal
Rating:
Category:
Remove a Malware / Virus
Solution Id:
1031392
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.