# Program Executable Analyzer
## Description
This script analyzes MZ-PE (MS-DOS) executable file.
This tool is useful for malware analysis or debug/understand compiled dependencies.
1. Verify signature and print informations about signature and trust
2. Analyze DLLs and imported functions name
3. Analyze exported functions name
4. Get executable filename at the compiled time
6. Get encodings and languages used for compilation
7. Print informations about rich headers
8. Get timestamps saved in executable
9. Print informations about sections and characteristics (permissions, ect...)
10. Print the entry point position and section
11. Get architecture, system version, resources (Version file, Manifest)
12. Get company name, product name, product version, copyright
13. Sections names, sizes, addresses and characteristics
14. Analyze MS-DOS and NT headers
15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory
16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
17. Extract overlay
TODO: analyze results to detect language and score the risk.
## Requirements
- python3
- Python 3 Standard library
### Optional
- matplotlib
- EntropyAnalysis
> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`
## Installation
```bash
pip install ProgramExecutableAnalyzer
```
## Usages
```bash
python3 ProgramExecutableAnalyzer.py -h
python3 ProgramExecutableAnalyzer.py executable.exe
python3 ProgramExecutableAnalyzer.py -c executable.exe # No color
python3 ProgramExecutableAnalyzer.py -v executable.exe # Verbose mode
```
## Screenshots
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png "PE Headers Analysis")
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png "PE Version Analysis")
![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png "PE Imports Analysis")
![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png "PE Signature Informations")
![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png "PE Entropy Analysis")
![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png "PE Compare Section Size Charts")
## Links
- [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)
- [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)
- [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)
- [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)
## Licence
Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).
Raw data
{
"_id": null,
"home_page": "https://github.com/mauricelambert/ProgramExecutableAnalyzer",
"name": "ProgramExecutableAnalyzer",
"maintainer": "Maurice Lambert",
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": "mauricelambert434@gmail.com",
"keywords": "PE, MZ, DLL, MS-DOS, Program, Forensic, Analysis, Executable, Malware-Analysis, Reverse-Engineering",
"author": "Maurice Lambert",
"author_email": "mauricelambert434@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/f0/7e/c1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a/programexecutableanalyzer-1.1.1.tar.gz",
"platform": "Windows",
"description": "# Program Executable Analyzer\n\n## Description\n\nThis script analyzes MZ-PE (MS-DOS) executable file.\n\nThis tool is useful for malware analysis or debug/understand compiled dependencies.\n\n 1. Verify signature and print informations about signature and trust\n 2. Analyze DLLs and imported functions name\n 3. Analyze exported functions name\n 4. Get executable filename at the compiled time\n 6. Get encodings and languages used for compilation\n 7. Print informations about rich headers\n 8. Get timestamps saved in executable\n 9. Print informations about sections and characteristics (permissions, ect...)\n 10. Print the entry point position and section\n 11. Get architecture, system version, resources (Version file, Manifest)\n 12. Get company name, product name, product version, copyright\n 13. Sections names, sizes, addresses and characteristics\n 14. Analyze MS-DOS and NT headers\n 15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory\n 16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)\n 17. Extract overlay\n\nTODO: analyze results to detect language and score the risk.\n\n## Requirements\n\n - python3\n - Python 3 Standard library\n\n### Optional\n\n - matplotlib\n - EntropyAnalysis\n\n> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.\n>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`\n\n## Installation\n\n```bash\npip install ProgramExecutableAnalyzer\n```\n\n## Usages\n\n```bash\npython3 ProgramExecutableAnalyzer.py -h\npython3 ProgramExecutableAnalyzer.py executable.exe\npython3 ProgramExecutableAnalyzer.py -c executable.exe # No color\npython3 ProgramExecutableAnalyzer.py -v executable.exe # Verbose mode\n```\n\n## Screenshots\n\n![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png \"PE Headers Analysis\")\n![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png \"PE Version Analysis\")\n![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png \"PE Imports Analysis\")\n![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png \"PE Signature Informations\")\n![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png \"PE Entropy Analysis\")\n![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png \"PE Compare Section Size Charts\")\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)\n - [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)\n - [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)\n - [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n",
"bugtrack_url": null,
"license": "GPL-3.0 License",
"summary": "This script analyzes MZ-PE (MS-DOS) executable.",
"version": "1.1.1",
"project_urls": {
"Executable": "https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz",
"Homepage": "https://github.com/mauricelambert/ProgramExecutableAnalyzer"
},
"split_keywords": [
"pe",
" mz",
" dll",
" ms-dos",
" program",
" forensic",
" analysis",
" executable",
" malware-analysis",
" reverse-engineering"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "f07ec1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a",
"md5": "f857ef11cf4b896d090d5a71ddd754f8",
"sha256": "d382cb1f2435cac39a6d31eb9248b7d14c4b651b18eff1d7c1e96c4aee0b355b"
},
"downloads": -1,
"filename": "programexecutableanalyzer-1.1.1.tar.gz",
"has_sig": false,
"md5_digest": "f857ef11cf4b896d090d5a71ddd754f8",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 36880,
"upload_time": "2024-11-12T21:14:46",
"upload_time_iso_8601": "2024-11-12T21:14:46.871698Z",
"url": "https://files.pythonhosted.org/packages/f0/7e/c1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a/programexecutableanalyzer-1.1.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-11-12 21:14:46",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "mauricelambert",
"github_project": "ProgramExecutableAnalyzer",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "programexecutableanalyzer"
}