I have been analyzing several EXE installers using 7-Zip, which sometimes interprets .exe files as archives and displays their internal structure. In some of these files I have noticed two unusual entries:
- A very large entry called
[0](hundreds of KB or even MB), which appears to be a section but is not visible in standard PE tools like CFF Explorer, PEView or x64dbg - Another file-like entry simply called
SIGNATURE
This behavior occurs in .exe files that do not appear to be compressed with UPX or other common compression tools (as confirmed by tools like Detect It Easy). The file also appears to be a standard Windows Portable Executable.
My questions are:
- What exactly do the
[0]andSIGNATUREentries represent in this context? Are they part of the PE structure, overlay data, digital signature, or something else? - Why does 7-Zip interpret them as separate entries, while other PE analysis tools ignore or do not display them?
- Is there a way to replicate this behavior? For example, can I generate a minimal
.exefile (e.g., compiled in C/C++ or using a specific tool) that causes 7-Zip to show[0]and/orSIGNATURE? - Could this be related to how the file was compiled, signed, or integrated with resources?
Any information on what causes 7-Zip to parse some parts of a PE file differently would be greatly appreciated.
It seems that binary content interpreted as being contained within [0] is automatically displayed by 7-Zip when you open the file.
Screenshots:
Here 7-Zip interprets and displays SIGNATURE and [0] entries, which seem to be sections or embedded files
CFF Explorer does not show those sections that 7-Zip used to show
It's possible that 7-Zip interprets certain parts of the file (such as overlay data, unused space, or embedded metadata) as if they were archive entries. This might explain why it shows [0] and SIGNATURE, while standard PE tools ignore them.
Alternatively, these entries could represent special sections or metadata structures that only 7-Zip is able to detect and display explicitly — possibly due to how it parses the binary without strictly adhering to the formal PE section table.
I'd appreciate any insight into whether this behavior is specific to 7-Zip’s parsing logic or if there's an actual hidden structure in the file that other tools overlook.


