PE Files

Statically Analyze Code

Speakeasy

Emulate code execution, including shellcode, Windows drivers, and Windows PE files.

Website: https://github.com/fireeye/speakeasy Author: FireEye Inc, Andrew Davis License: MIT License: https://github.com/fireeye/speakeasy/blob/master/LICENSE.txt Notes: run_speakeasy.py, emu_exe.py, emu_dll.py State File: remnux.python3-packages.speakeasy

binee (Binary Emulation Environment)

Analyze I/O operations of a suspicious PE file by emulating its execution.

Website: https://github.com/carbonblack/binee Author: Carbon Black, Kyle Gwinnup, John Holowczak License: GNU General Public License (GPL) v2: https://github.com/carbonblack/binee/blob/master/LICENSE Notes: Before using this tool, place the files your sample requires under /opt/binee-files/win10_32. For example, the Windows DLLs it needs should go /opt/binee-files/win10_32/windows/system32. If you have a Windows 10 64-bit system, you can get the 32-bit DLLs from C:\Windows\SysWOW64 To check which DLLs you might need by examining the import table using the "-i" parameter. State File: remnux.packages.binee

capa

Detect suspicious capabilites in PE files.

Website: https://github.com/fireeye/capa Author: FireEye Inc, Willi Ballenthin: https://twitter.com/williballenthin, Moritz Raabe: https://twitter.com/m_r_tz License: Apache License 2.0: https://github.com/fireeye/capa/blob/master/LICENSE.txt State File: remnux.packages.capa