You are a cybersecurity analyst who has identified a suspicious executable file on a company workstation. Describe how you would use Joe Sandbox to analyze this file?
Submit the file to Joe Sandbox, which will replace the existing file with a clean version based on known good signatures.
Submit the file to Joe Sandbox, which will decompile the file to its source code for manual review.
Submit the file to Joe Sandbox, which will scan for known signatures in its database to determine if the file is malicious.
Submit the file to Joe Sandbox, where it will be executed in an isolated environment to monitor its behavior and system interactions.