malware-s2e icon indicating copy to clipboard operation
malware-s2e copied to clipboard

Code for my blog post on using S2E for malware analysis

Analysing "Trigger-based" Malware with S2E

This code accompanies my Analysing "Trigger-based" Malware blog post and slides.

Both directories should be copied into the windows directory of the guest-tools repo in your S2E environment, located at $S2EDIR/source/s2e/guest/windows.

Open the s2e.sln solution in Visual Studio and add the malware-inject, GetLocalTime-hook and wannacry-hook projects to the s2e solution.

The GetLocalTime-test project can be used to test symbolic execution of GetLocalTime. GetLocalTime-test is a stand-alone project and does not have to be added to the s2e solution.