Detect It Easy (DiE)

Detect It Easy (DiE) is a versatile, free utility primarily designed for identifying the file type and analyzing the structure of executable files, with a strong focus on Portable Executable (PE) files commonly found on Windows (.exe, .dll, .sys, etc.), but also supporting other formats like ELF (Linux) and Mach-O (macOS). It helps analysts understand how a file was compiled, what packer or protector might have been used, and what resources or dependencies it contains.

Key features relevant to screensharing include:

  • Packer/Protector/Compiler Detection: DiE incorporates a large database of signatures to identify common software packers (UPX, Themida, VMProtect, Aspack, etc.), protectors (Safeguard, Enigma), compilers (MS Visual C++, Delphi, GCC), and linkers used to create the executable. Identifying the use of a packer, especially a strong commercial one like Themida or VMProtect, on an unknown executable is highly suspicious as these are frequently used to obfuscate malware and cheats.

  • PE Structure Analysis: Allows detailed examination of the PE file's headers (DOS header, NT headers, Optional header), sections (.text, .data, .rsrc, etc.), import table (listing DLLs and functions the file uses from external libraries), export table (functions the file provides, relevant for DLLs), and embedded resources. Anomalies in the structure (e.g., unusual section names, non-standard entry points) can be indicators of modification or packing.

  • String Extraction: Can extract embedded ASCII and Unicode strings from the file. Searching these strings can reveal clues like internal function names, developer comments, error messages, configuration keys, URLs, or keywords related to cheating (aimbot, esp, hwid) or anti-analysis (VirtualBox, Debugger).

  • Entropy Calculation: Calculates and often visually displays the entropy for the entire file and for individual sections, aiding in the identification of packed or encrypted sections (as discussed above).

  • Dependency Viewer: Analyzing the import table shows which system DLLs (like kernel32.dll, user32.dll) and potentially non-standard DLLs the executable relies on. Importing suspicious functions related to memory manipulation (WriteProcessMemory), hooking (SetWindowsHookEx), or debugging detection (IsDebuggerPresent) can raise flags.

  • Troubleshooting Non-Executing Files: As highlighted in the hypothetical scenarios, if a suspicious executable file fails to run during a screenshare or closes immediately (perhaps due to detecting AnyDesk or other tools), DiE provides a safe way to analyze its structure, strings, imports, and packer information without executing it, potentially revealing its purpose or confirming its malicious nature based on these static characteristics.

DiE serves as a valuable static analysis tool, helping ScreenSharers dissect executables to identify obfuscation, suspicious dependencies, embedded strings, and other structural indicators that hint at malicious intent or cheating capabilities.

Last updated