PE Explorer. Heaventools. Malware Code Analysis Made Easy



Similar documents
EMCO Network Inventory 5.x

Remote Deposit Capture Installation Guide

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users

Registry Tuner. Software Manual

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

Spyware Doctor Enterprise Technical Data Sheet

Deposit Direct. Getting Started Guide

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

NETWRIX CHANGE NOTIFIER

NETWRIX WINDOWS SERVER CHANGE REPORTER

Installation Guide: Delta Module Manager Launcher

Charter Business Desktop Security Administrator's Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

In this chapter you will find information on the following subjects:

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

SYSTEM REQUIREMENTS...

AVG File Server User Manual. Document revision (11/13/2012)

Sage BusinessWorks Accounting 2013 System Standards

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

AVG File Server User Manual. Document revision (8/19/2011)

U90Ladder / VisiLogic /UniLogic and software utilities system requirements. Contents

AVG File Server. User Manual. Document revision ( )

Imaging Computing Server User Guide

FAQ. Safe Anywhere PC. Disclaimer:

CRM Outlook Plugin Installation

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Avira Small Business Security Suite. HowTo

Impact+OCR 1.1 Readme

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

Avira Endpoint and Security. HowTo

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

How to Install MS SQL Server Express

Witango Application Server 6. Installation Guide for Windows

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

Welcome To Paragon 3.0

Core Protection for Virtual Machines 1

BillQuick HR 2008 Start-Up Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

BitDefender Security for Exchange

System Environment Specifications Network, PC, Peripheral & Server Requirements

for Invoice Processing Installation Guide

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

Get Started Guide - PC Tools Internet Security

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

E-CERT C ONTROL M ANAGER

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

Read Me UNISTREAM AUTOMATION IDE

AVG 8.5 Anti-Virus Network Edition

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation

Total Defense Endpoint Premium r12

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Avira System Speedup. HowTo

BillQuick Agent 2010 Getting Started Guide

User Guide Win7Zilla

The Value of Physical Memory for Incident Response

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

SysPatrol - Server Security Monitor

Microsoft Office Outlook 2010: Level 1

Authoring for System Center 2012 Operations Manager

SQL Server 2008 is Microsoft s enterprise-class database server, designed

Brother Automatic Printing OPERATION MANUAL

Kaseya 2. User Guide. Version 1.1

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Remote Deposit Capture Installation Guide

Seqrite Antivirus Server Edition

ESET NOD32 ANTIVIRUS 8

PGP Universal Satellite Version 2.7 for Windows Release Notes

Operating Instructions

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

TurningPoint PC FAQ. Why do I get the message that indicates my receiver is not licensed to work with TurningPoint?

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Client Server Messaging Security3

User Installation Guide

Table of Contents. 1. Overview Materials Required System Requirements User Mode Installation Instructions..

PARTNER ACS R4.0 Remote Administration R4.0. Getting Started

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

Change Manager 5.0 Installation Guide

Advanced Malware Cleaning Techniques for the IT Professional

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version January 2008

User's Guide. Copyright 2012 Bitdefender

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

PasswordTraveler User s Manual

NETWRIX FILE SERVER CHANGE REPORTER

Practice Fusion API Client Installation Guide for Windows

Antivirus. Quick Start Guide. Antivirus

Quick Start Guide. www. K7Computing.com

System Requirements - CommNet Server

Analyzer 2.0. Installation Guide. Contents

ESET SMART SECURITY 6

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sharpdesk V3.5. Push Installation Guide for system administrator Version

Windows 7 USB/DVD download tool

avast! Pro Antivirus 7.0 Quick Start Guide avast! Pro Antivirus 7.0 Quick Start Guide

ESET NOD32 ANTIVIRUS 9

FedEx Ship Manager Software. Installation Guide

Transcription:

Heaventools PE Explorer Data Sheet Malware Code Analysis Made Easy Reverse engineers within the anti-virus, vulnerability research and forensics companies face the challenge of analysing a large number of maliciuos software appearing at an incredible rate. Software developers look for an effective way to safely inspect and dissect potentially harmful Windows executable files. Meeting this need, Heaventools offers PE Explorer, an integrated collection of tools that provide a framework for working with EXE, DLL, ActiveX controls, and other executable file formats that run on MS Windows 32-bit platforms. Though anti-virus software is continually getting better, a very significant percentage of malware escapes the automated screening process. PE Explorer offers an in-depth look at the inner workings of downloaded executable files, and helps software companies determine if a binary is harmful by examining it manually and without relying on the automated scanning engines.

PE Explorer greatly reduces the time needed to understand the structure of complex malware. This application unfolds each header, section and table found in an executable file to reveal the values stored inside those structures and reduce the numerous internal information sources of the binary file into a more convenient viewing format, providing the user with easy-to-read information about the function of the executable. PE Explorer exposes entire structure and all resources in suspect file in order to research and reverse engineer it. With PE Explorer, the user can rapidly analyze the procedures and libraries a malware executable uses without ever activating the executable itself - a great advantage over debuggers where malicious code needs to be run to be analyzed. Disassembler Dissassembling the code makes it possible to study exactly how the program works, and even identify potential vulnerabilities. If you reverse engineer spyware on a system, you could determine exactly what type of information the application was trying to snoop, as well as its other capabilities. Other uses for reverse engineering include the discovery of undocumented APIs or porting drivers, and for software patch analysis. PE Explorer is designed to be easy to use compared with other disassemblers. While as powerful as the more expensive, dedicated disassemblers, PE Explorer focuses on ease of

use, clarity and navigation. It supports the common Intel x86 instruction sets along with extensions such as MMX, 3D Now!, SSE, SSE2 and SSE3, and utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary win32 PE files with the highest degree of accuracy possible. The disassembler also extracts ASCII text strings from the data portion of the executable file. Unlike the various strings utilities that search and extract the text strings from a file, PE Explorer is much more accurate and detailed in extracting these strings out from specified memory locations instead of searching. The output of strings found in the binary gives the user a good knowledge of what some of the functions and subroutines called by this binary are. Publisher Verification A great tool for detecting viruses, malware, and other executable nasties, the user can use PE Explorer to review and validate the Microsoft Authenticode digital signature, if present, in the loaded executable file. This is a powerful way to examine a certificate-based digital signature of the executable, validate the identity of the software publisher, and verify that the signature is valid. Reversing Packed Worms and Trojans PE Explorer can open a variety of file types ranging from the common, such as EXEs and DLLs, to the less familiar types, such as DPL and CPL files. But, in real life, viruses, worms and trojans are often compressed, obfuscated and protected from reverse engineering. PE Explorer works on packed malware executables and can handle a file even if it has been packed and modified manually so that the standard uncompressing method cannot be used

directly to unpack the file. PE Explorer supports for files modified with Upack and many UPX scramblers. Now the user can open these obfuscated files with PE Explorer even without knowing that: the files will be unpacked automatically. Additionally, the product provides an open interface for plugging in custom start-up processing modules for crypted files handling. Visual Resource Editor PE Explorer combines a resource viewer, extractor, and a resource editor. Once the file is open, you will see a directory-like structure of the embedded resources, such as icons, images, sounds, strings, dialogs, menus, XML data, HTML data, and toolbars. With PE Explorer, you can view, extract, replace, edit, and delete the resources of your own software. More importantly, this application lets you rebrand third party applications and libraries for which you do not have source code with new icons, strings and version numbers. Keeping pace with changes to the Windows Operating System, PE Explorer helps your legacy applications take advantage of the new common control styles and appearances featured in Windows XP and Vista, and mark pre-vista applications with a requested execution level, providing the way to deploy the same builds of the applications on both Windows Vista and Windows XP.

Dependency Scanner Another feature is the Dependency Scanner, which scans all the modules that the executable file links to statically and those that are delay-loaded, and it then displays them in a hierarchal tree structure, showing where the executable reaches to. PE Explorer can help you learn the minimum set of DLL files required for the EXE file to load and run, and the complete path to modules loaded by the EXE file. It is helpful in discovering missing or invalid modules, import/export mismatches, circular dependencies and other module-related problems, and in troubleshooting system errors caused by the loading or executing of modules. Industry Feedback I use PE Explorer on.sys files as I am an NT/XP device driver system architect. I was interested in understanding the way.sys files interact with one another and this tool enabled me to understand that interaction a bit better. - Dominick Cafarelli, Sniffer Technologies, Network Associates I've been using PE Explorer for a while, and am very impressed with the latest version's functions especially the disassembler. - Conrad Herrmann, Zone Labs, Inc. Minimum System Requirements PE Explorer runs on all versions of Windows from 95 through Server 2003 and Vista. Intel Pentium or AMD K5 processor with 166 MHz 16 MB RAM 15 MB free hard disk space Users working with large file sizes will benefit from system requirements that exceed those listed above. This will ensure a faster disassembling. Product Maintenance PE Explorer comes with 18 months of maintenance and support included, beginning with the date of purchase. Ordering Information We offer a free trial version, so you can try the software, risk free. We encourage you to try out PE Explorer and basic technical support free of charge for 30 days before you make a decision regarding the purchase. When you are ready to buy, we welcome you to www.heaventools.com to order directly from us, or through our resellers. Heaventools Software http://www.heaventools.com 101-1001 West Broadway Dept. 381 Vancouver, BC, V6H4E4, Canada Fax: +1 (206) 984-3919 Email: sales@heaventools.com