# mbcscan > Scan a PE file to list the associated Malware Behavior Catalog (MBC) details. **Category:** [[categories/statically-analyze-code-pe-files|Statically Analyze Code > PE Files]] | **Tier:** Standard (docs) **Docs:** [https://docs.remnux.org/discover-the-tools/statically+analyze+code/pe-files](https://docs.remnux.org/discover-the-tools/statically+analyze+code/pe-files) ## Related Tools - [[tools/binee-binary-emulation-environment|binee (Binary Emulation Environment)]] — Analyze I/O operations of a suspicious PE file by emulating - [[tools/capa|capa]] — Identify malware capabilities mapped to MITRE ATT&CK framewo - [[tools/speakeasy|speakeasy]] — Windows binary emulator — emulates API calls to analyze malw #statically-analyze-code-pe-files