- Apr 9, 2020
- 667
Yeah really the main thing you can go by is the idea of a low reputation binary modifying files, especially in My Documents and other user-valuable paths. This is how most behavior blocker identify ransomware and when a low-reputation EXE is doing that work themselves, that is an easy rule to write. Kaspersky and Emsisoft simply halt such an application mid-act and give you a few seconds to answer whether or not you expected them to be doing this. Others automatically terminate the application but give you an option to whitelist and try it again.
This proactive technique breaks down for scripts (difficult to measure reputation) and when you use another binary that's well-trusted to do your dirty work for you.
Asking the user to make the decision will only help those who are tech-savvy. Most users click "allow" on everything. They don't know better and per default use "allow" because otherwise things they need don't work anymore. So, this is only beneficial to a certain type of user. It's preferred to have a decision by the AV product itself.
With that said, there is no wide-spread ransomware that doesn't provide any of the other features I mentioned if they want to be somewhat profitable. E.g. all of them have shadow copy deletion by now. Those are the behaviours that---in combination with the encryption and renaming---might be detected with heuristics.
Once the ransomware is known, we also catch the newly packaged variants by other means than heuristics.