Ransomware-specific protection will, among others, check the following behaviour:
- writing to AV specific bait files
- modification of many files in a row
- entropy increase in modified files
- file extension change
- shadow copy deletion
If one ransomware already encrypted files and bait files, other ransomware that would target the same files has nothing to do anymore (given that it searches by extensions which have already been changed).
It will not encrypt, not change entropy, not modify the bait files and therefore not show any malicious behaviour that might have been detected.
More general protection mechanisms also include the way samples were obtained, e.g., files that were downloaded via a browser have a specific identifier. These identifiers are missing here. Files that arrive via email attachments, downloaders, droppers or exploits, show certain malware typical patterns that are detected as well. None of these protection mechanisms have a chance in this artificial testing scenario.
Unless you actually want to protect your system from a scenario where you will execute hundrets of ransomware samples in a row, this test is not meaningful in any way.