Sunbelt Software has launched a new version of automated dynamic malware analysis tool CWSandbox, which it claims to leverages unique behaviour analysis technology for the identification of malicious threats such as PDF exploits, fake media players and other socially engineered attacks against enterprise or government networks.

The company said that the CWSandbox v3.0 enables security analysts and incident response teams to analyse the behaviour of suspected files by executing code inside a controlled and monitored environment. It records all malicious activity including system changes, network traffic and memory dumps.

In addition, the new version also features Digital Behavior Traits (DBT) technology, which interprets the behaviour of a file, ad, document or website to determine automatically whether it is malicious. It provides users the ability to analyse virtually any Windows application or file including infected documents, malicious URLs, custom applications and scripts in Flash ads.

Chad Loeven, vice president and general manager of SunbeltLabs, said: Automated threat analysis is essential to organisations that are targeted by malware writers with brand new viruses that have not yet been categorised or catalogued by traditional antivirus solutions.

“Especially when it comes to our nation’s cyber-defense, the front lines need the right advanced analysis tools to be able to protect critical data.