Open and agile malware
analysis tools to deeply
understand malicious codes.
Joe Sandbox is the automated malware analysis system which implements any state of the art program analysis technology from coarse to fine grained including dynamic, static and hybrid. Joe Sandbox’s analysis spectrum enables to discover any behavior including hidden or obfuscated parts.
Joe Sandbox is the only system that analyzes cyber threats on Windows XP, Vista, W7, W7 x64, W8, Android platforms and Mac OS X. Joe Sandbox enables analysis on virtual, physical and simulated machines.
Joe Sandbox understands and analyzes a wide range of file formats including any PE files, office documents, browser plugins, URLs, android application packages, MachOs and DMGs.
Joe Sandbox generates extensive reports in PDF, HTML, JSON, XML and OpenIOC format. Additional forensic results include PCAPs, Yara Rules, screenshots, memory dumps, dropped files, unpacked PE files, strings and code dumps.
Joe Sandbox is an intelligent multilayered system which enables to processes large amount of files very quickly. With the help of simulation Joe Sandbox can extract the behavior of a sample with native CPU speed and without the need of virtualization and a full operating system.
Joe Sandbox is an open malware analysis system with a high setup and configuration freedom. All key processes including analysis environment setup, malware startup, behavior analysis and detection can be customized. Joe Sandbox includes several APIs for seamless automation and integration.