I believe you did not understand “Dynamic Analysis” correctly. You think it is cloud emulation (detonation), similar to the Check Point Threat Emulation. Dynamic analysis refers to executing portions (of interest) from executables and scripts code in a virtual environment on your computer, that mimics a real system. The Cloud Detonation is sometimes referred to as “Dynamic Analysis” too, so it’s easy to make a mistake.
I’ve read the full Sophos SAVI documentation (which since then became unavailable, perhaps it never should’ve been public) where all the features and how OEMs should configure them were listed. I am unsure if Dynamic Analysis in Sophos is enabled. This is why I’m asking whose dynamic analysis takes priority on the machine, as it looks like CP Static Analysis (part of NGAV) also emulates locally, on your computer, whatever it can’t analyse statically or disassemble (there are 2 guys doing the same).
The E2 engine does not perform just cloud lookups, cloud lookups were enabled in 87.30, before which the engine used only the full set of signatures and heuristics, which are about 500MB (2 sets x 250 mb each).
The E1 was ran at full capacity, just like E2 with their “behavioural genotype”, E1 does not push simple signatures (fragments of malware), it is predominantly a heuristics-based engine and majority of heuristics are based on dynamic analysis, and not on static features. For example on a packer, there are almost no static features that could be extracted. Obfuscated scripts as well can only be handled through dynamic analysis.
The various engines are not used in different context, all engines listed in first post are used one after another in pre-execution protection (on every new file created that gets captured by the mini filter driver). I wonder which one is first, which one is second, etc. The scan flow is interesting to me.