PEStudio is a unique tool that performs the static investigation of 32-bit and 64-bit executable.
Malicious executable often attempts to hide its malicious behavior and to evade detection. In doing so, it generally presents anomalies and suspicious patterns. The goal of PEStudio is to detect these anomalies, provide Indicators and score the Trust for the executable being analyzed. Since the executable file being analyzed is never started, you can inspect any unknown or malicious executable with no risk.
PEStudio is delivered as a ZIP file (MD5: B4AFD29A5DD2FB54E7234817F0CED135). Once the package is decompressed, PEStudio does not require any installation nor does it change the system it is running on. PEStudio is portable and runs on any Windows Platform.
ReferencesPEStudio is proudly referenced and used by many professionals for Digital Forensic Investigations and Trainings around the world, like:
LicencePEStudio is free for private non-commercial use only. Despite that fact of being free for non-commercial use, any donation to support the development of the tool is more than welcome. For commercial use of PEStudio, please contact the author, to obtain more details about the License models and prices.
IndicatorsPEStudio shows Indicators as a human-friendly result of the analysed image. Indicators are grouped into categories according to their severity. Indicators show the potential and the anomalies of the application being analysed. The classifications are based on XML files provided with PEStudio. By editing the XML file, one can customize the Indicators shown and their severity. Among the indicators, PEStudio shows when an image is compressed using UPX or MPRESS. PEStudio helps you to define the trustworthiness of the application being analysed.
Virus DetectionPEStudio can query Antivirus engines hosted by Virustotal for the file being analysed. This feature only sends the MD5 of the file being analysed. This feature can be switched ON or OFF using an XML file included with PEStudio. PEStudio helps you to determine how suspicious the file being analysed is.
ImportsEven a suspicious binary or malware file must interact with the operating system in order to perform its activity. For this to be possible, a certain amount of libraries must be used. PEStudio retrieves the libraries and the functions used by the image. PEStudio also includes an XML file that is used to blacklist functions (e.g. Registry, Process, Thread, File, ...). The blacklist file can be customized and extended according to your own needs. PEStudio shows the intent and purpose of the application analyzed.
ResourcesExecutable files typically not only contain code but also many kinds of data types. Resources sections are commonly used to host different Windows built-in items (e.g. icons, strings, dialogs, menus) and custom data. PEStudio analyzes the resources of the file being analysed and detects embedded items (e.g. EXE, DLL, SYS, PDF, CAB, ZIP, JAR, ...). Any item can be separately selected and saved to a file, allowing the possibility of further analysis.
ReportThe goal of PEStudio is to allow investigators to analyse unknown and suspicious executable files. For this purpose, PEStudio can also produce an XML Output Report file documenting the executable file being analysed. The goal of this XML Output Report file is the ability to be utilized by any third-party analysis tool. To better accomplish this goal, an XML Schema will be published soon.