PEframe is a open source tool to perform static analysis on Portable Executable malware and generic suspicious file. It can help malware researchers to detect packer, xor, digital signature, mutex, anti debug, anti virtual machine, suspicious sections and functions, and much more information about the suspicious files.
Documentation will be available soon.
$ peframe <filename> Short output analysis
$ peframe --json <filename> Full output analysis JSON format
$ peframe --strings <filename> Strings output
You can edit stringsmatch.json file to configure your fuzzer and virustotal apikey.
Short data example | Full data (JSON) example
Prerequisites
Python 2.7.x
How to
To install from PyPI:
# pip install https://github.com/guelfoweb/peframe/archive/master.zip
To install from source:
$ git clone https://github.com/guelfoweb/peframe.git $ cd peframe # python setup.py install
Note
For Windows environment, you need to follow the instructions here: https://github.com/ahupp/python-magic#dependencies (Thanks to Biagio)
- SANS DFIR Poster 2016 (PEframe was listed in the REMnux toolkits)
- Tools for Analyzing Static Properties of Suspicious Files on Windows (SANS Digital Forensics and Incident Response, Lenny Zeltser).
- Automated Static and Dynamic Analysis of Malware (Cyber Defence Magazine, Andrew Browne, Director Malware Lab Lavasoft).
- Suspicious File Analysis with PEframe (eForensics Magazine, Chintan Gurjar)
- Bulletin CERTFR-2014-ACT-030 (PEframe was mentioned in the security bulletin by CERT FR)
- Infosec CERT-PA Malware Analysis (PEframe is used in the malware analysis engine of Infosec project, developed by Davide Baglieri)
This tool is currently maintained by Gianni 'guelfoweb' Amato, who can be contacted at [email protected] or twitter @guelfoweb. Suggestions and criticism are welcome.