AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

From Mid to Magic

MetaDefender Sandbox v2.0.0 Ushers in a New Era of Cybersecurity Threat Analysis
by OPSWAT
Share this Post

We're thrilled to introduce the latest milestone in cybersecurity resilience, MetaDefender Sandbox v2.0.0. This release brings with it not only an updated user interface, but powerful features that boost MetaDefender Sandbox’s efficacy rates to nearly 100% — up over 30% overall.

Line graph showing the efficacy of threat analysis solutions from January to April 2024 across various file types

The new UX design of Filescan.io represents a significant step forward, blending aesthetic appeal with enhanced functionality. The new, more responsive UI centers around a user-first approach, along with a future-proof foundation for new features. 

New Streamlined User Interface

1. Clean and fresh UI with a unified OPSWAT look and refreshed report design. The most interesting indicators can be filtered so users can focus on the most important information. 

OPSWAT MetaDefender Sandbox dashboard showing detailed malware analysis with various threat indicators highlighted
Process analysis flowchart in OPSWAT MetaDefender Sandbox detailing interactions between files, networks, and processes for malware detection

2. Threat hunting and analysis features available on the home page and streamlined navigation for effortless use.

Overview of OPSWAT MetaDefender Sandbox's advanced threat analysis dashboard highlighting the power of cloud reputation to identify hidden threats

Threat hunters can easily reach a simplified version of the threat hunting page with the most common filters. This page is easy to use, with a new combined search field for names, IPs, domains, and hashes. There are multiple values allowed for many filters, a more sophisticated and precise filter for YARA rules, plus threat indicators and MITRE ATT&CK techniques and tactics. 

OPSWAT MetaDefender Sandbox user interface showing base filters for threat hunting in a cybersecurity framework

Support for Sandbox Installation on Offline Systems

Previously, Sandbox installation required an Internet connection, but it is now possible to run the installation process on offline systems using a prebuilt installation package*.

Features and Benefits of an Offline Installer for Sandbox

Detailed report view in OPSWAT MetaDefender Sandbox identifying a file as malicious with multiple threat indicators

No Internet Required

Ideal for critical, air-gapped environments, users can install MetaDefender Sandbox in locations without Internet access using the prebuilt installation package.

Screen showing extracted files from a potentially malicious executable analyzed by OPSWAT MetaDefender Sandbox

Convenience

Simplified installation process, especially in secure environments where internet access may be restricted.

Admin panel in OPSWAT MetaDefender Sandbox displaying a log of user activities and system events for security monitoring

Security

Reduced exposure to online threats during the installation process.

Detailed authentication log in OPSWAT MetaDefender Sandbox's admin panel showing user sign-in activities and security levels

Portability

Can be distributed via USB drives, CDs, or internal networks, making it easy to deploy in various environments.

Consistency

Ensures that all users have the same version and setup, avoiding issues related to inconsistent or partial downloads.

Who Benefits from Sandbox v.2.0.0?

SOC Analysts and Incident Responders

MetaDefender Sandbox seamlessly integrates with other MetaDefender solutions like ICAP, Kiosk, Secure Storage, and Managed File Transfer for defense-in-depth security.

IT Professionals

MetaDefender Sandbox is super secure and easy to deploy and maintain both in the cloud and on-premises with a variety of installation mediums.

Educational Institutions

For academic purposes, it’s now easier than ever to teach programming and cybersecurity without the need for internet access.

Corporations

MetaDefender Sandbox improves organizations’ security posture by producing detailed, comprehensive reports that empower SOC analysts and aid regulatory compliance.

Security

MetaDefender Sandbox now ensures installations are safe from internet-based threats with offline installation options.

Reliability

Enjoy Consistent installation experiences without reliance on internet speed or availability.

Convenience

Not only can MetaDefender Sandbox be installed offline, but its deployment remains consistent even in restricted environments.

Enhanced Metadata and Behavioral Information Extraction for MSI, LNK, AutoIT and ODF Files 

As malware authors continuously innovate, distributing malicious code through more complex methods like MSI installers and LNK shortcuts has become more common. Traditional sandbox environments might not be equipped to extract all the information and fully handle these file types, leading to gaps in threat detection and analysis.

Malware Detection

Many malware variants are distributed as MSI installers or through LNK shortcuts. Additionally, scripting malware can be compiled into executable files, hiding its plaintext code. The ability to analyze these file types in a sandbox helps identify and mitigate these threats more effectively.

Behavioral Insights

Understanding how an MSI installer modifies the system or how an LNK file redirects or executes can provide valuable insights into potential vulnerabilities or malicious behaviors. Furthermore, MetaDefender Sandbox now extracts macro code ODF files, which have their own language to implement additional behavior.

This example demonstrates how we now apply the corresponding AutoIT tag for the root input file:

Then, we can see that the AutoIT script is extracted and decompiled to plain text from the same PEEXE input file: 

Improved indicators and detections for already supported file types

Among the many new indicators, we’ve included similarity matches between Office document icons and PEEXE icons. It is common to try to masquerade executable file types by using icons and file extensions used for documents. Now MetaDefender Sandbox flags such icons used in executables based on Dhash, a similarity hash implemented for images.

Audit Logging Framework for Admin Settings and User Authentication

The new audit logging feature captures events happening in the system. These events include setting changes, logins and logouts, and registers whether operations succeed or fail. The audit logger captures the event, the user responsible for it, an error message in case of an error, and the before and after states where applicable

Types of Audit Logs

There are multiple types of audit logs, each logging events for a specific component of the system.

Admin Settings

The Admin Audit Logger logs any event happening on the Admin Panel including changing settings; creating, modifying or deleting users or groups; etc.

User Authentication

The Authentication Audit Logger logs any login and logout events. 

A complete list of features and enhancements in the release can be found in the Release Notes for MetaDefender Sandbox v2.0.0. 

* Due to legal reasons, this installation package cannot be downloaded directly from my.opswat.com. To prepare the assets for the offline installation, an online computer or virtual machine running Ubuntu 22.04 is required. After the preparation step is completed, the offline installation can be performed on multiple offline systems using the same prebuilt assets. 

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.