{"id":660561,"date":"2013-05-28T05:57:59","date_gmt":"2013-05-28T09:57:59","guid":{"rendered":"http:\/\/betanews.com\/?p=154869"},"modified":"2013-05-28T05:57:59","modified_gmt":"2013-05-28T09:57:59","slug":"pestudio-lets-you-analyse-suspicious-programs-for-malware","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/660561","title":{"rendered":"PeStudio lets you analyse suspicious programs for malware"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-61825\" title=\"files folders magnifying glass security scanning antivirus\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2012\/03\/files-folders-magnfying-glass-security-scanning-antivirus-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" \/>If you find a program on your PC which you think might be malware, then checking it with an antivirus tool is a good first step &#8212; but it\u2019s not the only option. You could also try &#8220;static analysis&#8221;, which involves examining the executable file itself to learn more about it. Most static analysis tools are aimed at developers and extremely complex, but the free <a title=\"PeStudio\" href=\"http:\/\/www.downloadcrew.com\/article\/30348-pestudio\" >PeStudio<\/a> is an interesting exception: it offers plenty of low-level detail, but also has more straightforward features that just about anyone can use.<\/p>\n<p>It\u2019s easy to get started with the program. Just download and unzip it, launch PeStudio.exe, and drag and drop your suspect executable onto the PeStudio window. Wait a few seconds for the program to run its analysis, and a detailed report then appears.<\/p>\n<p>The first tab, Indicators, gives you some useful information about the target application. Some of this is strictly experts-only, with details on the file\u2019s use of DEP, ASLR, SafeSEH, Thread Local Storage, and so on. But you also get plenty of more generally useful data. Is it 32 or 64-bit, for instance? GUI, or console-based? Does it need administrative permission? Is it digitally signed?<\/p>\n<p>Clicking the Strings tab will then reveal any embedded text strings in the program &#8212; function names, paths, prompts, web addresses, error messages and more &#8212; which can be a useful way to figure out what it\u2019s doing. (Malware will usually employ various tricks to hide this kind of information, but it\u2019s still worth a try.)<\/p>\n<p>The Misc tab (if present) shows you any properties of your mystery executable. This might include file and product names, a description, version number, target language, and so on. Don\u2019t assume any of this is true &#8212; malware could provide any details it likes here &#8212; but, again, it might help explain what the program is and where it\u2019s come from.<\/p>\n<p>And if none of this is too conclusive, then clicking Indicators &gt; VirusTotal Scan Report will tell you whether any of the VirusTotal antivirus engines (46, as we write) thinks the executable is malware. Again, don\u2019t take the VirusTotal verdict as guaranteed, it\u2019s possible you\u2019ve encountered something which hasn\u2019t been recognized yet, but it\u2019s still useful to see what the rest of the antivirus world thinks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-154871 alignleft\" title=\"PeStudio\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2013\/05\/PeStudio-600x523.jpg\" alt=\"\" width=\"288\" height=\"251\" \/><\/p>\n<p>If you know your way around the executable file format then you\u2019ll also appreciate the Libraries and Imports tabs, which reveal the DLLs and other support files required by your program, and the functions it\u2019s using. The Resources tab is another plus, listing structures embedded within your program. While command line support means all this analysis can be automated and used to check a host of files in a single operation.<\/p>\n<p>You don\u2019t have to delve into these complexities unless you really want to, though &#8212; and that\u2019s the major plus here. There\u2019s plenty of low-level information for experts, but all these technicalities don\u2019t get in your way, and even if you\u2019re a PC novice, you\u2019ll still be able to use <a title=\"PeStudio\" href=\"http:\/\/www.downloadcrew.com\/article\/30348-pestudio\" >PeStudio<\/a> to find out more about any mystery program.<\/p>\n<p><strong>Photo credit:<\/strong> <a href=\"http:\/\/www.shutterstock.com\/gallery-697561p1.html\" >megainarmy<\/a>\/<a href=\"http:\/\/www.shutterstock.com\/\" >Shutterstock<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=ZTXNZxzGzr8:GQjyBmS-wG4:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=ZTXNZxzGzr8:GQjyBmS-wG4:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/bn\/~4\/ZTXNZxzGzr8\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you find a program on your PC which you think might be malware, then checking it with an antivirus tool is a good first step &#8212; but it\u2019s not the only option. You could also try &#8220;static analysis&#8221;, which involves examining the executable file itself to learn more about it. Most static analysis tools [&hellip;]<\/p>\n","protected":false},"author":7429,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-660561","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7429"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=660561"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660561\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=660561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=660561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=660561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}