yara/rules/Windows_VulnDriver_EneIo.yar (19 lines of code) (raw):

rule Windows_VulnDriver_EneIo_6e01882f { meta: author = "Elastic Security" id = "6e01882f-8394-4e32-8049-fa9c4588b087" fingerprint = "8077212bfbadc7f47f2eb76f123a6e4bcda12009293cb975bbeaba77f8c9dcd0" creation_date = "2022-04-04" last_modified = "2022-04-04" threat_name = "Windows.VulnDriver.EneIo" reference_sample = "175eed7a4c6de9c3156c7ae16ae85c554959ec350f1c8aaa6dfe8c7e99de3347" severity = 50 arch_context = "x86" scan_context = "file" license = "Elastic License v2" os = "windows" strings: $str1 = "\\Release\\EneIo.pdb" condition: int16(uint32(0x3C) + 0x5c) == 0x0001 and $str1 }