Here is the breakdown of why "Desktop Execution" yields incomplete results for Owlyshield (and most EDRs).
You Break the "Process Tree" (Context Loss)
This is the biggest issue. EDRs like Owlyshield heavily analyze the Process Tree (parent-child relationships).
Real Attack: A user opens a PDF → The PDF reader spawns PowerShell → PowerShell downloads and runs a .exe.
EDR View: "Why is a PDF reader launching PowerShell? Block."
This Test: You double-click malware.exe on the desktop.
Process Tree: explorer.exe (the Windows desktop) → malware.exe.
EDR View: "The user voluntarily launched a program from the desktop."
Result: This looks exactly like you launching Firefox or Calculator. By running it manually, you remove the "suspicious parentage" signal, making it harder for the EDR to detect the threat based on context.
It Only Tests the "Payload," Not the "Delivery"
Attacks often occur in stages.
Stage 1 (Delivery): Exploit, script, or macro.
Stage 2 (Payload): The actual RAT or ransomware. By dropping the malware on the desktop, you are skipping Stage 1 completely. You are testing if Owlyshield can catch the specific file signature or the ransomware behavior (file encryption), but you are failing to test if it would have caught the script that downloaded it in the first place.
Static Analysis vs. Behavioral Analysis
Static (On-Write/On-Access). When you paste the file to the desktop, Owlyshield (via its Minifilter driver) will see the file creation. If it has a known signature for that specific file, it might catch it immediately.
If the static check fails, the malware runs. Since you stripped the context (Point #1), Owlyshield now has to wait for the malware to do something visibly bad (like touching the LSASS process or mass-deleting shadow copies) to trigger an alert.
What it demonstrates, It tests if the EDR has a signature for that specific file hash, or if the malware is so noisy (e.g., instant encryption) that it triggers behavioral rules immediately.
What it misses, It fails to test "Novelty Detection" regarding exploitation chains, suspicious parent processes, and network delivery vectors.