Skip to main content
ShieldOps
Back to blog
Threat Research

Detecting zero-day ransomware before encryption begins: a deep-dive into behavioural analysis

Sarah Mitchell·Principal Threat ResearcherFeb 28, 202514 min read

In 2024, our threat research team analysed 312 ransomware campaigns across financial services, healthcare, and critical infrastructure. The finding that changed our detection philosophy: the average time between initial access and the first encrypted file is just 6.3 seconds. Signature-based detection is structurally incapable of closing that gap.

The anatomy of a modern ransomware attack

Modern ransomware operators have industrialised their workflows. They use legitimate system tools (LOLBins), encrypt in memory before writing to disk, and deploy multi-threaded encryption engines that can saturate a 1Gbps NFS mount in under 90 seconds. By the time a hash-based detection fires, the damage is done.

What attackers cannot hide, however, is behaviour. Regardless of the payload variant, ransomware must enumerate file systems, establish or re-use a key exchange, and perform I/O operations at abnormal rates. These signals are detectable — if you know where to look.

The 6-second window

Key finding

Across 312 campaigns, 94% of ransomware samples began bulk file I/O within 6.3 seconds of initial execution. Deployments with a pre-loaded kernel driver reduced this to 1.8 seconds.

We broke the kill chain into four measurable phases: (1) Discovery — process tree maps drives and enumerates directory structures. (2) Key negotiation — a symmetric key is either generated locally or retrieved from a C2 server. (3) Staging — a memory-resident encryption engine is loaded. (4) Execution — files are encrypted sequentially or via worker threads.

Phases 1–3 are where behavioural detection has leverage. By the time Phase 4 begins, intervention must be near-instant or it's too late.

Behavioural signals that matter

  • File entropy spike: legitimate applications writing to disk produce low-entropy output. Encrypted data is near-maximum entropy (≥7.8 bits/byte). A process writing >50 high-entropy files in <2 seconds is anomalous.
  • Shadow copy deletion: 89% of ransomware strains delete VSS snapshots via vssadmin.exe or WMI. This is now a near-deterministic pre-cursor.
  • Abnormal handle acquisition rate: enumerating thousands of file handles in a burst is measurable at the kernel level without needing file content inspection.
  • Canary file triggering: placing known-content files at the root of every drive and monitoring for unexpected modifications provides a zero-false-positive tripwire.
  • Process hollowing and injection into trusted processes: most modern strains inject into svchost.exe or explorer.exe. Tracking parent–child process relationships and memory region permissions detects this.

How ShieldOps implements pre-encryption detection

Our EDR kernel driver instruments file system minifilter callbacks and exposes a streaming telemetry pipeline to our analysis engine. We compute entropy on write buffers before they reach the disk cache, which gives us detection before persistence.

plaintext
[RULE] ransomware.pre_encrypt.v3
condition:
  process.file_writes_per_sec  > 80
  AND file.write_entropy_avg   > 7.6
  AND process.parent_unsigned  = true
  AND NOT process.path IN whitelist.system_writers
action: ISOLATE_PROCESS, SNAPSHOT_MEMORY, ALERT_CRITICAL

What this means for your SOC

Behavioural detection requires tuning. A rule that fires on every video encoder or backup agent is useless. We recommend a 30-day baselining period per endpoint class before enabling automated isolation. Start with alert-only mode, review false positives, and build your whitelist incrementally.

Actionable takeaway

Enable canary files today — it requires no tuning and adds zero false positives. Place a 0-byte file named _shieldops_canary.txt at the root of every mounted volume. Any modification triggers an immediate high-confidence alert.

Ransomware is not a malware problem — it is a response time problem. The organisations that recover quickly are those whose detection-to-isolation pipeline is measured in seconds, not minutes. Behavioural analysis is the only architectural approach that achieves this reliably.

Ready to see ShieldOps in action?

Join 2,000+ security teams protecting their infrastructure.

Get a free demo