Skip to main content

RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14341))

  • 758 Accesses

Abstract

The pre-encryption behaviour of ransomware refers to the period before the ransomware begins to encrypt the files, where it performs activities to conceal its presence or gather sensitive information of the victim system. For any detection model, it is crucial to restrain ransomware activity before it causes significant damage or spreads further throughout the system. In this regard, we propose RTR-Shield a novel rule based tool to detect and block crypto ransomware activity in its early stage of execution. The tool primarily relies on two monitoring blocks: Registry Activity Monitoring Block (RAMB) and File Trap Monitoring Block (FTMB). RAMB is derived based on forensic analysis of registry modifications performed by 27 recent ransomware families within the first 10 s of payload execution. We also reveal the common keys and values that a ransomware modifies in its pre-encryption phase. FTMB is constructed based on the study of different directories that the ransomware initially access and deploy trap files at strategic locations. In our evaluation, RTR-Shield demonstrates its efficacy in detecting and blocking ransomware activity during the initial stages of encryption, even for previously unseen ransomware variants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tajoddin, A., Abadi, M.: RAMD: registry-based anomaly malware detection using one-class ensemble classifiers. Appl. Intell. 15(49), 2641–58 (2019)

    Article  Google Scholar 

  2. Apap, F., Honig, A., Hershkop, S., Eskin, E., Stolfo, S.: Detecting malicious software by monitoring anomalous windows registry accesses. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 36–53. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36084-0_3

    Chapter  Google Scholar 

  3. Zavarsky, P., Lindskog, D.: Experimental analysis of ransomware on windows and android platforms: evolution and characterization. Procedia Comput. Sci. 1(94), 465–72 (2016)

    Google Scholar 

  4. Chayal, N.M., Saxena, A., Khan, R.: A review on spreading and forensics analysis of windows-based ransomware. Ann. Data Sci. 8, 1–22 (2022)

    Google Scholar 

  5. Sgandurra, D., Muñoz-González, L., Mohsen, R., Lupu, E.C.: Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 (2016)

  6. Chen, Z.G., Kang, H.S., Yin, S.N., Kim, S.R.: Automatic ransomware detection and analysis based on dynamic API calls flow graph. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, pp. 196–201 (2017)

    Google Scholar 

  7. Vinayakumar, R., Soman, K.P., Velan, K.S., Ganorkar, S.: Evaluating shallow and deep networks for ransomware detection and classification. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 259–265 (2017)

    Google Scholar 

  8. Kok, S.H., Abdullah, A., Jhanjhi, N.Z., Supramaniam, M.: Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers. 8(4), 79 (2019)

    Article  Google Scholar 

  9. Anand, P.M., Charan, P.S., Shukla, S.K.: A comprehensive API call analysis for detecting Windows-based ransomware. In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 337–344 (2022)

    Google Scholar 

  10. RegShot Tool [online] https://github.com/Seabreg/Regshot

  11. Intel blog on Revil Ransomware [online] https://intel471.com/blog/changes-in-revil-ransomware-version-2-2

  12. Windows Registry Forensic Analysis - by AndreaFortuna [online] https://andreafortuna.org/2017/10/18/windows-registry-in-forensic-analysis/

  13. Carvey, H.: Windows registry forensics: advanced digital forensic analysis of the windows registry. Elsevier (2011)

    Google Scholar 

  14. Ganfure, G.O., et al.: Deepware: imaging performance counters with deep learning to detect ransomware. IEEE Trans. Comput. 72(3), 600–613 (2022)

    Google Scholar 

  15. Pundir, N., Tehranipoor, M., Rahman, F.: RanStop: a hardware-assisted runtime crypto-ransomware detection technique. arXiv preprint arXiv:2011.12248 (2020)

  16. Manaar, A., et al.: Rapper: Ransomware prevention via performance counters. arXiv preprint arXiv:2004.01712 (2020)

  17. Putrevu, M.A., Putrevu, V.S.C., Shukla, S.K.: early detection of ransomware activity based on hardware performance counters. In: Proceedings of the 2023 Australasian Computer Science Week, pp. 10–17 (2023)

    Google Scholar 

  18. Eşref, A.: Incident response-detection and analysis on recent versions of microsoft Windows. MS thesis. Fen Bilimleri Enstitüsü

    Google Scholar 

  19. Gómez-Hernández, J.A., Sánchez-Fernández, R., García-Teodoro, P.: Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Inf. Secur. 16(1), 64–74 (2022)

    Article  Google Scholar 

  20. Sheen, S., Asmitha, K.A., Venkatesan, S.: R-sentry: deception based ransomware detection using file access patterns. Comput. Electr. Eng. 103, 108346 (2022)

    Article  Google Scholar 

  21. Ganfure, G.O., et al.: RTrap: trapping and containing ransomware with machine learning. IEEE Trans. Inf. Forensics Secur. 18, 1433–1448 (2023)

    Article  Google Scholar 

  22. Charan, P.S., et al.: DOTMUG: a threat model for target specific APT attacks-misusing google teachable machine. In: 2022 10th International Symposium on Digital Forensics and Security (ISDFS). IEEE (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Mohan Anand .

Editor information

Editors and Affiliations

Appendices

A Algorithm for RTR-Shield

figure u

B Summary of Modifications Made to the Registry by Various Ransomware Families

figure v
figure w

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anand, P.M., Charan, P.V.S., Chunduri, H., Shukla, S.K. (2023). RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files. In: Meng, W., Yan, Z., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2023. Lecture Notes in Computer Science, vol 14341. Springer, Singapore. https://doi.org/10.1007/978-981-99-7032-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7032-2_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7031-5

  • Online ISBN: 978-981-99-7032-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics