Deep Malware Analysis
for dissecting Malware targeting
Windows, Android and Mac OS X.
Joe Sandbox is the automated malware analysis system which implements novel and innovative analysis technology which enable to analyse the malware in a depth previoulsy not possible. Analysis technologies include static, dynamic, hybrid and simulation. While other sandboxes fail Joe Sandbox discovers any behavior including hidden, non executed or obfuscated parts.
Joe Sandbox is the only automated malware analysis system that analyzes cyber threats dynamically on Windows XP, Vista, W7, W8, W10, Android and Mac OS X. Joe Sandbox does not depend on QEMU or KVM and therefore also analyses Malware on physical machines, including bare-metal laptops, PCs and phones.
Joe Sandbox understands and analyzes a wide range of file formats including any PE files, office documents (PDF, DOC, DOCX, DOCXM, XLS, PPT, HWP, JTD etc), browser plugins, scripts (JS, VBS, VBE, PS), JAR files, URLs, Mails, APKs, MachOs, DMGs and more.
Joe Sandbox generates extensive reports in PDF, HTML, JSON, XML, MAEC, MISP and OpenIOC format. Additional forensic results include PCAPs, Yara Rules, screenshots, memory dumps, dropped files, unpacked PE files, strings, code dumps and C-like codes (decompilation). No other sandbox provides a similiar extensive result set.
Joe Sandbox is an intelligent multilayered system which enables to process large numbers of files rapidly. While other sandboxes require many manual steps scaling in Joe Sandbox is fully automated and done in minutes. Joe Sandbox has unique static filters to only analyse interesting files.
Joe Sandbox offers the highest setup and configuration freedom. All key processes including analysis environment setup, malware startup, behavior analysis and detection can be fully customized. Joe Sandbox has extensive set of APIs and interfaces which enalbe deep integration. Joe Sandbox is the Sandbox for OEM!