PeStudio is a free tool that allows you to do the static investigation of any Windows executable binary.
A file being analyzed with PeStudio is never launched, therefore you can evaluate unknown executable and even malware with no risk.
PeStudio runs on any Windows Platform and is fully portable, no installation is required. It does not change the system or leaves anything behind.
It is used by many Computer Emergency Response Teams (CERT) worldwide in order to perform malware initial assessments.
Malicious software often attempts to hide its intents in order to evade early detection and static analysis. In doing so, it often leaves suspicious patterns, unexpected metadata, anomalies and other indicators.
The goal of PeStudio is to spot these artifacts in order to ease and accelerate Malware Initial Assessment. The tool uses a powerful parser and a flexible set of configuration files that are used to detect various types of indicators and determine thresholds. Since the file being analyzed is never started, you can inspect unknown or malicious executable file, trojan and ransomware without any risk of infection.
PeStudio implements a rich set of features that are specially designed to retrieve every single detail of an executable file. Results are checked against the Microsoft specification. Additionally, the content of the file being analyzed is checked against several white and black lists and thresholds.
- Virus Detection: PeStudio can query Antivirus engines hosted by Virustotal. Only the MD5 of the file being analyzed is sent. This feature can be switched ON or OFF using an XML file included with PeStudio.
- Imports: Even a suspicious binary file must interact with the operating system in order to perform its activity. PeStudio retrieves the libraries and the functions referenced. Several XML files are used to blacklist functions (e.g. Registry, Process, Thread, File, etc). Blacklist files can be customized and extended according to your own needs. PeStudio brings out the intent and purpose of the application analyzed.
- Resources: Resources sections are commonly used by malware to host payload. PeStudio detects many embedded file types (e.g. EXE, DLL, SYS, PDF, CAB, ZIP, JAR, etc ). Detected items can be saved to a file, allowing, therefore, the possibility of further analysis.
- Report: The goal of PeStudio is to allow investigators to analyze unknown and suspicious executable files. For this purpose, PeStudio can also produce an XML output report file documenting the executable file being analyzed. The goal of this XML output Report file is to offer its further use by any third-party analysis tool.
- Prompt: PeStudio runs from the Graphical User Interface (GUI) as well as from the Command prompt (CLI). Running PeStudio from the prompt offers the possibility to analyze the executable file and to create associated XML output files in a batch mode.