Skip to main content

Early Detection of Ransomware by Indicator Analysis and WinAPI Call Sequence Pattern

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 107))

Abstract

In the present paper, an analytical study has been done on a specific type of malware that is ransomware. Recent events all over the globe suggest ransomware as the growing threat because it encrypts targeted data of victim and keeps the decryption key with itself until a fair amount of ransom is paid, generally through cryptocurrency. Also its new variants keep coming up with better and stronger application, stay undetected of anti-malware software and intrusion detection systems. The idea for this paper was to develop an early detection system dedicated to ransomware. We took dynamic malware analysis approach for this paper. Behavioral study was done on 300 downloaded ransomware, also by making our own ransomware and understanding its background working (for Windows platform) and general modus operandi. Sets of behavioral indicators and Microsoft Detours libraries were used to hook Windows API call sequences to understand run-time behavior and filter out the ransomware from Benign software. The achievement of the present work is an automated framework which can be used to make user’s system protected from ransomware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scaife, N., Carter, H., Traynor, P., Butler, K.: CryptoLock (and Drop It): stopping ransomware attacks on user data. In: IEEE 36th ICDCS (2016)

    Google Scholar 

  2. Gupta, S., Sharma, H., Kaur, S.: Malware characterization using windows API call sequences. In: Carlet, C., Hasan, M., Saraswat, V. (eds.) Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, vol. 10076. Springer, Cham (2016)

    Chapter  Google Scholar 

  3. Detours. https://www.microsoft.com/en-us/research/project/detours/

  4. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2011)

    Google Scholar 

  5. Bitcoin—Open source P2P money. https://bitcoin.org/

  6. Zebpay Bitcoin India. https://www.zebpay.com/

  7. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. DIMVA (2015)

    Google Scholar 

  8. Garfinkel, S., Farrell, P., Roussev, V., Dinolt, G.: Bringing science to digital forensics with standardized forensic corpora. Digit. Invest. 6, Supplement (2009)

    Google Scholar 

  9. Trend Micro Inc. https://www.trendmicro.com/

  10. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Int. J. Inf. Comput. Secur. 6(3) (1998)

    Article  Google Scholar 

  11. Jana, S., Shmatikov, V.: Abusing file processing in malware detectors for fun and profit. In: IEEE Symposium on Security and Privacy (S&P) (2012)

    Google Scholar 

  12. Zeltser Security Corp. https://zeltser.com/malware-sample-sources/

  13. GitHub Inc. https://github.com/fabrimagic72/malware-samples

  14. Contagiodump. http://contagiodump.blogspot.in/2016/03/ransomwareosxkeranger-samples.html

  15. Malware Tips. https://malwaretips.com/forums/malware-vault-samples.104/

  16. Virus Total. https://www.virustotal.com/

  17. AnalyzeIT. http://www.shockingsoft.com/AnalyzeIt.html

  18. Kempthorne, D., Steele, A.: An evaluation of different delivery methods for teaching binary, hex and decimal conversion. J. Appl. Comput. Inf. Technol. 18(2) (2004)

    Google Scholar 

  19. Zhang, D., Bi, Y., Jiang, L.: Influence of hexadecimal character and decimal character for power waveform data compression. In: IEEE International Conference on Sustainable Power Generation and Supply (2009)

    Google Scholar 

  20. WinMerge. http://winmerge.org/

  21. Hex-Rays. https://www.hex-rays.com/products/ida/

  22. Visual Studios. https://www.visualstudio.com/

  23. William, B., Cavnar, J., Trenkle, M.: N-gram-based text categorization. Environ. Res. Inst. Michigan. (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harshit Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, H., Kant, S. (2019). Early Detection of Ransomware by Indicator Analysis and WinAPI Call Sequence Pattern. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 107. Springer, Singapore. https://doi.org/10.1007/978-981-13-1747-7_20

Download citation

Publish with us

Policies and ethics