Explore Joe Security Cloud Basic Accounts Contact Us
top title background image

Joe Sandbox Ultimate

Automated Deep Malware Analysis targeting Windows, Android or Mac

Joe Sandbox Ultimate executes files and URLs fully automated in a controlled environment and monitors the behavior of applications and the operating system for suspicious activities. All activities are compiled into comprehensive and extensive analysis reports.

Analysis and classification reports, which contain key information about potential threats, enable cyber-security professionals to deploy, implement and develop appropriate defence and protections.
Joe Sandbox Ultimate

Joe Sandbox Ultimate Explained

Joe Sandbox Ultimate Explained

Joe Sandbox Ultimate's architecture is modular. It consists of at least one controller machine running Linux and multiple connected analysis machines (with Windows and Android installed) hosted by virtualization products such as VMware or VirtualBox.

Files and URLs are uploaded for analysis to Joe Sandbox Ultimate manually, via RESTful Web API or via Joe Sandbox Mail Monitor. Joe Sandbox Ultimate first analyzes the file statically. After that an in-depth analysis is performed with Joe Sandbox Desktop.

Joe Sandbox Ultimate's configurable and efficient dynamic and static analysis engine monitors any activities during the binary program execution. Click to read more about Joe Security's unique technologies to analyze binaries.

The executed behavior of the sample is compiled into a detailed analysis report.


Request a Joe Sandbox Ultimate demo

Have a look at the behavior analysis reports generated by Joe Sandbox Ultimate or contact Joe Security to schedule a technical presentation and demo.

Comprehensive Reports

Joe Sandbox Ultimate generates very detailed analysis reports about system, network, browser and tampering/code manipulation behavior. The report includes evaluations and additional data about strings, domains and file structures. Matching generic signatures highlight suspicious and malicious key behavior. Classification and threat scores help to detect sophisticated cyber-attacks quickly. A context based search enables to quickly navigate.

Comprehensive Reports

All Files on all Platforms

Joe Sandbox Ultimate enables analysis of all executable files (including malicious documents) on Windows 10 x64 and Windows 11 x64. Android Application Packages (APK) can be analyzed on Android 9 and 13. In addition Joe Sandbox Ultimate analyses files on macOS Monterey and Ventura (Intel and Apple Silicon) and Linux.

All Files on all Platforms

Analysis of Office Files

Joe Sandbox Ultimate analyses Office files for Microsoft Word, Excel and Powerpoint. Support for additional Office suites can be easily added.

Analysis of Office Files

Deep URL Analysis

Joe Sandbox Ultimate enables to deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. For phishing detection Joe Sandbox Ultimate browses URLs on a real operating system. Joe Sandbox Ultimate will follow and click interesting links on webpages.

Deep URL Analysis

2565+ Generic and Open Behavior Signatures

Joe Sandbox Ultimate uses a growing set of over 2565+ generic Behavior Signatures to detect and classify malicious behavior activities such as Exploiting and Shellcode (for malicious documents), Persistence, Boot Survival, Spreading, Data Spying and Leakage and C&C Communication. Behavior Signatures are extendable and customizable and optionally are shared within a community.

2565+ Generic and Open Behavior Signatures

Interact with the Analysis Machine

With Joe Sandbox Ultimate analysts can directly connect to the analysis machine and click manually through complex malware installers or phishing attacks. The remote assistance option is fully embedded in the browser and therefore no additional software has to be installed. Live Data such as behavior, Yara and Sigma signature hits as well as IOCs are shown in real time.

Interact with the Analysis Machine

Multilayered System with intelligent Chaining

Joe Sandbox Ultimate implements an intelligent malware analysis chain, starting with coarse grained and ending with in-depth fine grained malware analysis techniques. The intelligent chain enables to sort out uninteresting samples and focus on the most interesting malware samples.

Multilayered System with intelligent Chaining

Analyses Hidden Payloads

Joe Sandbox Ultimate's Hybrid Code Analysis (HCA) engine identifies code functions based on dynamic memory dumps. HCA enables in-depth analysis of malware by understanding hidden payloads, malicious functionality not seen during runtime analysis. HCA results are highly annotated and connected to dynamic behavior information. Through an advanced algorithm, HCA identifies hidden API calls and hidden strings within codes.

Analyses Hidden Payloads

Execution Graphs

Joe Sandbox Ultimate generates highly condensed control flow graphs, so called Execution Graphs. Execution Graphs enable to detect evasions against malware analysis systems. Furthermore Execution Graphs allow to rate the behavior by looking at API chains, execution coverage and loops. Joe Sandbox Ultimate also includes extensive library code detection.

Execution Graphs

SSL Proxy

Joe Sandbox Ultimate enables to inspect HTTPS traffic. Similiar to a next generation firewall Joe Sandbox Ultimate installs a MITM SSL Proxy which intercepts and analyzes any SSL traffic. This allows to inspect malicious HTTPS C&C traffic which is often used in APTs.

SSL Proxy

IDS Network Analysis

Joe Sandbox Ultimate enables to analyze automatically the network data via Suricata and "The Bro Network Security Monitor". Suricata with e.g. Emerging Threats ETOpen/ETPro rules detects malicious IPs, Domains or other network artifacts and Files extracted by Bro are automatically uploaded to Joe Sandbox.

IDS Network Analysis

Yara

Joe Sandbox Ultimate allows to use Yara Rules for advanced malware detection. Joe Sandbox Ultimate forwards all samples, downloaded files, resources as well as memory dumps to Yara. In addition Joe Sandbox Ultimate features a nice web based Yara Rule editor. Tired of updating Yara rules? Joe Sandbox Ultimate enables to automatically synchronize with GitHub repositories contain Yara rules.

Yara

Sigma

Joe Sandbox Ultimate allows to use Simga Rules for threat detection. Joe Sandbox currently supports many Sigma events including process_creation and Sysmon. In addition Joe Sandbox Ultimate features a nice web based Sigma Rule editor. Tired of updating your Sigma rules? Joe Sandbox Ultimate enables to automatically synchronize with GitHub repositories contain Simga rules.

Sigma

Extensive supplementary Analysis Data

In addition to analysis reports in HTML, XML and JSON formats, Joe Sandbox Ultimate captures and generates supplementary data. This includes created files, unpacked PE files, memory dumps, PCAP of the captured network traffic (incl. decrypted HTTPS), screenshots, shellcode and strings.

Extensive supplementary Analysis Data

Reports provided in all relevant Formats

Joe Sandbox Ultimate reports are provided in all relevant export formats, ranging from common data exchange formats (XML, JSON) and document types (HTML, PDF) to malware security standards such as MAEC, CybOX, MISP and OpenIOC. Therefore, Joe Sandbox Ultimate reports can be seamlessly integrated with other tools and platforms.

Reports provided in all relevant Formats

MITRE ATT&CK

Joe Sandbox Ultimate provides a MITRE ATT&CK matrix. With the matrix, analysts can easily compare adversary tactics and techniques. Joe Sandbox Ultimate contains over 2565+ behavior signatures which are mapped to tactics and techniques.

MITRE ATT&CK

RestFul WEB API

Joe Sandbox Ultimate allows for seamless integration into existing threat intelligence systems. It has a simple RestFul WEB API which enables file upload, analysis data download, searches, filters, alerts and more. Example scripts in Python allow a fast integration.

RestFul WEB API

High Detection Precision

Joe Sandbox Ultimate is tuned to detect malicious samples with high precision. Extensive tests have shown an average false positive rate < 2% and false negative rate < 6% for PE files. Besides the detection status (clean, suspicious or malicious) Joe Sandbox Ultimate generates a detailed confidence score - outlining how certain the system is about the detection.

High Detection Precision

Optimized for High Throughput and Scalability

Joe Sandbox Ultimate is optimized for large-scale analysis and can handle up to several thousand samples per day on a single Joe Sandbox Ultimate instance. By scaling up the instances, Joe Sandbox Ultimate enables to analyze large sample sets very quickly.

Optimized for High Throughput and Scalability

Build for OEM Integration

Joe Sandbox Ultimate allows for seamless integration into existing security products. A .NET SDK, serving interfaces for automated file submissions and processors for handling generated analysis data is included. For bulk file submissions, Joe Sandbox Ultimate provides a queuing system with load-balancing and prioritization mechanisms. OEM customer have full control over the solution, its generated data and configuration.

Build for OEM Integration

Simplified Management and Control

Joe Sandbox Ultimate includes an intuitive web interface with features such as file and URL uploads, cookbook editor, user management and bulk upload/download and mail/syslog notifications.

Simplified Management and Control

Flexibility and Customization

Joe Sandbox Ultimate is built as a modular and scalable system with many settings for advanced tuning. With its open SDK, behavior signatures and cookbooks, it enables performing advanced use cases to serve organizations' specific needs. Joe Sandbox Ultimate supports multiple analysis machines with different applications/versions installed.

Flexibility and Customization

Additional Support, Maintenance and Consulting

Joe Security provides excellent services, such as system installations, training, maintenance, customization and expert knowledge as an supplemental package to Joe Sandbox Ultimate.

Additional Support, Maintenance and Consulting
* MAEC and the MAEC logo are trademarks of The MITRE Corporation.