Zscaler Cloud Sandbox is designed to detect advanced and previously unknown threats by deeply analyzing suspicious files in an isolated environment. According to Zscaler’s documented analysis pipeline, every sandboxed sample goes through a structured, multi-stage process rather than a single pass.
First, the file undergoes static analysis, where the system inspects the file without executing it. This phase looks at elements such as structure, headers, embedded resources, and known malicious patterns or indicators. Next, the file is executed in a dynamic analysis environment (a sandbox) where Zscaler observes runtime behavior such as process creation, registry modifications, file system changes, network connections, and attempts at evasion or privilege escalation.
During this dynamic phase, the file may drop or create additional files and artifacts. Zscaler then performs a second round of static analysis on those dropped components. This secondary static analysis is crucial because many sophisticated threats unpack or download their real payload only at runtime; analyzing those artifacts provides a much clearer view of the full attack chain.
Because of this defined three-step approach—static, dynamic, then secondary static analysis on dropped artifacts—option A is the correct description of how many rounds of analysis are performed on a sandboxed sample.
===========