Furthermore, we acknowledged that attackers would
attempt to reverse-engineer and discover information
about the protection mechanisms employed.
Therefore, we implemented techniques
commonly used by ransomware authors, specifically
obfuscation to utility tools. Our approach includes
several key components:
▪ Language Selection: We chose Rust as our
primary development language due to its
compiled nature, producing Windows Portable
Executable (PE) binaries that are inherently more
difficult to analyze than interpreted languages like
Python (Lee et al., 2023).
▪ String Obfuscation: We employed the obfstr()
library to hide string literals, making static
analysis more challenging for potential attackers.
▪ Reverse Engineering Resistance: The binaries
produced by Rust are inherently difficult to
reverse-engineer. Current industry-standard
reverse engineering tools are primarily optimized
for binaries compiled from C and C++ languages.
Additionally, there is limited expertise and fewer
practitioners in the field of reverse engineering
Rust binaries, creating an additional layer of
protection through obscurity.
Adversarial-aware design philosophy ensures that
the protection mechanisms remain effective even
when operating in a compromised environment.
Below are several contributions from this paper:
▪ We developed a resilient protection method that
considers an attacker-in-mind approach.
▪ We demonstrate that the methods are still
effective and relevant even against the most recent
ransomware family.
2 RELATED WORK
Most research on ransomware protection uses
behavior-based detection methods. These systems
watch what a user process does and check their API
calls to find ransomware patterns. However, these
methods have a common problem: it works too late.
This happens because the ransomware will be running
and start encrypting files before the detection system
can see the rogue behavior. They will always be one
step behind because they have to wait and watch.
Arabo et al developed a process behavior analysis
method to identify ransomware samples. Their
system watches which APIs are called and how much
system resources are used. They collect data about
file extensions, API calls, and disk usage, then feed
this information into machine learning models to alert
administrators if a program might be ransomware.
However, their approach has several problems. First,
it has low accuracy and lacks proper false-positive
analysis, meaning it might miss real ransomware or
wrongly flag a benign program. More importantly,
their system depends on a separate Linux machine to
do the analysis work. This creates a serious weakness
because if the network connection between the
Windows system (where ransomware runs) and the
Linux analysis machine gets cut off, the entire
detection system stops working. This network
dependency is especially dangerous because many
ransomware attacks include steps to disrupt network
communications or target network infrastructure. An
attacker could easily break the connection between
machines, leaving the Windows system completely
unprotected while the ransomware encrypts files
(Arabo et al., 2020).
Hampton et al. (2018) studied how ransomware
behaves on Windows systems by looking at which
APIs it calls. They found that ransomware uses
certain APIs more often than normal programs, which
can help identify ransomware without checking code
signatures. However, their research has important
gaps when dealing with obfuscated binaries. The
detection system is still weak because it only looks at
API calls that can be seen during static analysis. It
cannot detect API calls in programs that use Dynamic
API Resolving techniques, where the real API calls
are only revealed at runtime.
Microsoft has introduced Controlled Folder
Access (Microsoft, 2023), a security feature that only
allows trusted programs to access protected folders.
This is meant to stop ransomware from changing files
in those folders. However, this feature has several
serious problems. First, it depends heavily on user
permissions and doesn't protect against bad programs
that run in unprotected areas of the computer. If
attackers have enough system privileges, they can
easily bypass this protection. More importantly,
Controlled Folder Access relies on Windows
Defender's Real-Time Protection (RTP) service to
work properly. This creates a critical weakness
because many ransomware programs are designed to
kill Windows Defender and other security services as
their first step. Once the RTP service is disabled or
terminated, the Controlled Folder Access feature
stops working completely, leaving the protected
folders vulnerable to encryption.
While the R-Locker approach by (Gómez-
Hernández et al, 2018) shows innovation in using
honeyfiles to detect ransomware, their detection
mechanism has a significant weakness. The system
relies on placing honeyfiles in various locations to
catch ransomware activity. However, this approach is