Skip to content

Commit 886de6b

Browse files
[1.0.0] Verify signatures and print signatures informations && Fix: multiples bugs to resolve functions names
1 parent de26b3e commit 886de6b

File tree

5 files changed

+1057
-79
lines changed

5 files changed

+1057
-79
lines changed

PKG-INFO

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Metadata-Version: 2.1
22
Name: ProgramExecutableAnalyzer
3-
Version: 0.0.11
3+
Version: 1.0.0
44
Summary: This script analyzes MZ-PE (MS-DOS) executable.
55
Home-page: https://github.com/mauricelambert/ProgramExecutableAnalyzer
66
Author: Maurice Lambert
@@ -35,15 +35,24 @@ This script analyzes MZ-PE (MS-DOS) executable file.
3535

3636
This tool is useful for malware analysis or debug/understand compiled dependencies.
3737

38-
1. Analyze DLLs and imported functions name
39-
2. Analyze exported functions name
40-
3. Get executable filename at the compiled time
41-
4. Get encodings and languages used for compilation
42-
5. Get timestamps saved in executable
43-
6. Get architecture, system version, resources (Version file, Manifest)
44-
7. Get company name, product name, product version, copyright
45-
8. Sections names, sizes, addresses and characteristics
46-
9. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
38+
1. Verify signature and print informations about signature and trust
39+
2. Analyze DLLs and imported functions name
40+
3. Analyze exported functions name
41+
4. Get executable filename at the compiled time
42+
6. Get encodings and languages used for compilation
43+
7. Print informations about rich headers
44+
8. Get timestamps saved in executable
45+
9. Print informations about sections and characteristics (permissions, ect...)
46+
10. Print the entry point position and section
47+
11. Get architecture, system version, resources (Version file, Manifest)
48+
12. Get company name, product name, product version, copyright
49+
13. Sections names, sizes, addresses and characteristics
50+
14. Analyze MS-DOS and NT headers
51+
15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory
52+
16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
53+
17. Extract overlay
54+
55+
TODO: analyze results to detect language and score the risk.
4756

4857
## Requirements
4958

@@ -55,7 +64,7 @@ This tool is useful for malware analysis or debug/understand compiled dependenci
5564
- matplotlib
5665
- EntropyAnalysis
5766

58-
>> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
67+
> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
5968
>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`
6069

6170
## Installation
@@ -78,10 +87,14 @@ python3 ProgramExecutableAnalyzer.py -v executable.exe # Verbose mode
7887
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png "PE Headers Analysis")
7988
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png "PE Version Analysis")
8089
![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png "PE Imports Analysis")
90+
![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png "PE Signature Informations")
91+
![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png "PE Entropy Analysis")
92+
![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png "PE Compare Section Size Charts")
8193

8294
## Links
8395

8496
- [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)
97+
- [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)
8598
- [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)
8699
- [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)
87100

ProgramExecutableAnalyzer.egg-info/PKG-INFO

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Metadata-Version: 2.1
22
Name: ProgramExecutableAnalyzer
3-
Version: 0.0.11
3+
Version: 1.0.0
44
Summary: This script analyzes MZ-PE (MS-DOS) executable.
55
Home-page: https://github.com/mauricelambert/ProgramExecutableAnalyzer
66
Author: Maurice Lambert
@@ -35,15 +35,24 @@ This script analyzes MZ-PE (MS-DOS) executable file.
3535

3636
This tool is useful for malware analysis or debug/understand compiled dependencies.
3737

38-
1. Analyze DLLs and imported functions name
39-
2. Analyze exported functions name
40-
3. Get executable filename at the compiled time
41-
4. Get encodings and languages used for compilation
42-
5. Get timestamps saved in executable
43-
6. Get architecture, system version, resources (Version file, Manifest)
44-
7. Get company name, product name, product version, copyright
45-
8. Sections names, sizes, addresses and characteristics
46-
9. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
38+
1. Verify signature and print informations about signature and trust
39+
2. Analyze DLLs and imported functions name
40+
3. Analyze exported functions name
41+
4. Get executable filename at the compiled time
42+
6. Get encodings and languages used for compilation
43+
7. Print informations about rich headers
44+
8. Get timestamps saved in executable
45+
9. Print informations about sections and characteristics (permissions, ect...)
46+
10. Print the entry point position and section
47+
11. Get architecture, system version, resources (Version file, Manifest)
48+
12. Get company name, product name, product version, copyright
49+
13. Sections names, sizes, addresses and characteristics
50+
14. Analyze MS-DOS and NT headers
51+
15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory
52+
16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
53+
17. Extract overlay
54+
55+
TODO: analyze results to detect language and score the risk.
4756

4857
## Requirements
4958

@@ -55,7 +64,7 @@ This tool is useful for malware analysis or debug/understand compiled dependenci
5564
- matplotlib
5665
- EntropyAnalysis
5766

58-
>> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
67+
> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
5968
>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`
6069

6170
## Installation
@@ -78,10 +87,14 @@ python3 ProgramExecutableAnalyzer.py -v executable.exe # Verbose mode
7887
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png "PE Headers Analysis")
7988
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png "PE Version Analysis")
8089
![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png "PE Imports Analysis")
90+
![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png "PE Signature Informations")
91+
![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png "PE Entropy Analysis")
92+
![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png "PE Compare Section Size Charts")
8193

8294
## Links
8395

8496
- [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)
97+
- [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)
8598
- [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)
8699
- [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)
87100

0 commit comments

Comments
 (0)