Last Updated: 2017-08-11 17:18:43 UTC
by Basil Alawi S.Taher (Version: 1)
Triaging suspicious files with pestudio
Pestudio by is a utility can be used to Triage malware analysis . all you need is to drop the suspicious file to Pestudio and it will show you the imports, the resources and it will send the MD5 hash of the file to virustotal.
Pestudio can be obtained from https://www.winitor.com/binaries.html , there is no need for registration to download it.
Once you download Pestudio you have just to extract the file and use it.
If you are a command line fan you can just type the following:
And it will show you the options
pestudiox 8.61 - Malware Initial Assessment
Copyright © 2009-2017 Marc Ochsenmeier
pestudiox -file:input [-xml:output]
-file: input file to analyse
-xml: output xml report file
As you can see it’s straightforward to use the command line version of Pestudio ,you have just to specify the suspicious file and you have to specify the xml output file name.
Now let’s put Pestudio in action and try some sucepicious files. In this diary, I am going to use the GUI version.
For this diary I have obtain a sample malware from malware traffic analysis blog which is maintained by Brad Duncan the ISC Handler.
To triage a file with Pestudio you have to run it then you can drop the suspicious file to it or you can choose open file from the file menu.
It will take few seconds to do it’s analysis . As you can see in the screenshot the first thing it will show some general info about the file such as the MD5 hash and entropy.
Then there will be the indicator window, here Pestudio will tell you why it thinks this file is suspicious.
By default Pestudio will send a MD5 hash of the file to Virustotal and it will retrieve the results, if you don’t feel comfortable of sending such info to a third-party website. You can disable it by changing <score-file enable="1"/> to <score-file enable="0"/> in settings.xml file which is located in xml directory.
Pestudio retrieves the libraries and the functions referenced in the suspicious file. Pestudio comes with a predefined list of libraries and functions which is often used by malware.
The resources section will show if the suspicious file host a payload , in this example I have used different malware sample.
Unlike linux/unix strings command, pestudio will mark any suspicious string . pestudio comes with a predefined list of a suspicious strings (strings.xml).
In the version (OriginalFilename) it will show you the orginal file name and other information such as language and Product version.
Finally you can save the triage report as xml file and with your favorite xml parser.