This code accompanies my Analysing "Trigger-based" Malware blog post and slides.
Both directories should be copied into the windows directory of the
guest-tools repo in your S2E environment,
located at $S2EDIR/source/s2e/guest/windows
.
Open the s2e.sln
solution in Visual Studio and add the malware-inject
,
GetLocalTime-hook
and wannacry-hook
projects to the s2e solution.
The GetLocalTime-test
project can be used to test symbolic execution of
GetLocalTime
. GetLocalTime-test
is a stand-alone project and does not
have to be added to the s2e solution.