Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Anti-Virus, Anti-Malware, Security Utilities » PE-sieve 0.1.4.3 32bit    
File - Download PE-sieve 0.1.4.3 32bit
Description

Always scroll to the bottom of the page to download files on OlderGeeks.com.
We don't believe in fake/misleading download buttons and tricks.


PE-sieve 0.1.4.3 32bit
PE-sieve is a light-weitht tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches.
Detects inline hooks, Process Hollowing, Process Doppelgänging, Reflective DLL Injection, etc.

Usage

It has a simple, commandline interface. When run without parameters, it displays info about the version and required arguments:






When you run it giving a PID of the running process, it scans all the PE modules in its memory (the main executable, but also all the loaded DLLs). At the end, you can see the summary of how many anomalies have been detected of which type.






In case if some modified modules has been detected, they are dumped into a folder of a given process, for example:






JSON report specifies where the implants were found:






Detailed characteristics of the suspicious indicators are given in the JSON report, that is dumped into the same folder.

Short history & features from the author

Detecting inline hooks and patches

I started creating it for the purpose of searching and examining inline hooks. You can see its initial version here:


With time its precision and abilities significantly improved, and hooking detection is only one of many features of this tool.

In case if the code of the original executable was patched in memory, additionally to the main JSON report, PE-sieve generates a TAG file.






Its purpose is to describe at which offset a patch has been found, and of what type (either a patch, or a hook/redirection). We can easily see what function has been hooked and where the redirection leads to.






The file that was patched is also dumped on the disk, so that we can examine it more closely under a dissembler. The TAG file can be loaded i.e. into PE-bear. Thanks to this, we can easily browse the found hooks and check the code that was overwritten.






For example – in the application presented above, two functions within User32.dll have been hooked and their execution was redirected to the main module, loaded at 0x400000.

The same TAG file can be also loaded into IDA, with the help of the IFL plugin.

1.






2.






Sample use-case: PE-sieve helping to examine hooks installed by PBot adware.









Detecting hollowed processes

Later, I extended it to detect process hollowing etc – and it turned out to be pretty convenient unpacker:


Detecting Process Doppelgänging

In a similar manner, it can detects some other methods of impersonating a processes, for example Process Doppelgänging. The malicious payload is directly dumped and ready to be analyzed:


Manually loaded implants

PE-sieve scan is not limited to typically loaded modules. Full workingset of the process is scanned against the suspicious artefacts. Thanks to this, also PE files that are manually loaded are detected. Example: Kronos.









Some real-life example: Gand Crab’s manually loaded DLL was easily dumped with PE-sieve.

Recovering erased imports

PE-sieve has an ability to recover erased imports. In order to enable it, deploy it with an option /imp . Example – unpacking manually loaded payloads with imports erased (Emotet):


Recovering erased PE headers

Sometimes malware authors erase PE headers to evade tools that base their detection on the known patterns. PE-sieve still can detect the cases when the header was partially erased and reconstruct it:


Future development

The project is still not finished and I have many ideas how to make it better. I am planning to detect not only code modifications, but also other types of hooking, such as IAT and EAT patching.

Some in-memory patches are done by legitimate applications, so, in the future version I will provide capability of whitelisting defined patches.

I am also planning to extend its dumping capabilities against the malicious processes that are trying to defend themselves against dumpers etc.





Downloads Views Developer Last Update Version Size Type Rank
147 234 Hasherezade <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PE-sieve1_th.png"border="0"> Sep 13, 2018 - 11:05 0.1.4.3 546KB EXE 5/5, out of 2 Votes.
File Tags
PE-sieve  0.1.4.3  32bit    
   

Whoa there, Speedy! Your download is below
but you gotta read this first:

Like seeing no ads? No scammy, fake download buttons?
Wondering who's paying for the bandwidth? Well, we're
depending on you. This site operates on the honor system.
If your momma raised you to be honorable, you get to go
nuts downloading all you want after you make a donation.
This is how the site stays alive. Everyone hates ads. YUCK!
No one is stopping you from downloading without donating,
no one except your momma.
Thank you! -Randy & Deanna (The Older Geeks)

Monthly operating costs = $480
Donations for November = $157
Processed securely through Paypal.
No PayPal account required.

Donate Bitcoin:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm

Donate Ethereum:
0x40E56922F43637224935CDC35e2c96E0392A8505

Donate Litecoin:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL



Recent Super Donors ($50+)
Thanks, Joanna
Thanks, Bruce
Thanks, Travis

Recent Donors
Thanks, Midway Electronics
Thanks, Miles
Thanks, Chris
Thanks, Mikal
Thanks, Robert
Thanks, Richard
Thanks, Paul
Thanks, Bill's Motorcycle Repair

→→ Download Now ←← - Click to Rate File -
Like? Share this page on Twitter →


Copyright (c) 2018