pestudio implements a rich set of features that is especially designed to retrieve every single detail of any executable file. Results are checked against the Microsoft specification. Additionally, the content of the file being analyzed is checked against several white and black lists and thresholds.
pestudio can query Antivirus engines hosted by Virustotal. Only the MD5 of the file being analyzed is sent. This feature can be switched ON or OFF using an XML file included with pestudio.
Even a suspicious binary file must interact with the operating system in order to perform its activity.
pestudio retrieves the libraries and the functions referenced. Several XML files are used to blacklist functions (e.g. Registry, Process, Thread, File, etc). Blacklist files can be customized and extended according to your own needs. pestudio brings out the intent and purpose of the application analyzed.
Resources sections are commonly used by malware to host payload.
pestudio detects many embedded file types (e.g. EXE, DLL, SYS, PDF, CAB, ZIP, JAR, etc ). Detected items can be saved to a file, allowing therefore the possibility of further analysis.
The goal of pestudio is to allow investigators to analyze unknown and suspicious executable files.
For this purpose, pestudio can also produce an XML output report file documenting the executable file being analyzed. The goal of this XML output Report file is to offer its further use by any third-party analysis tool.
pestudio runs from the Graphical User Interface (GUI) as well as from the Command prompt (CLI). Running pestudio from the prompt offerts the possibillty to analyze executable file and to create associated XML output files in a batch mode.