/ basant / raw / python-ransomware.wiki
python-ransomware.wiki
1  Use a honeypot file to detect active ransomware and dump the process in hopes of finding the key, packaged with InnoSetup
2  
3  = Pipeline =
4  Honeypot file touched/modified -> Sysmon event rule (modified to include pid as argument) -> Task scheduler -> Python process dump 
5  
6  = Tasks =
7  Task scheduler is triggered from any Event11 Sysmon rule currently, needs to be specific to ransomware triggers
8  	* need to add a name to the rule, and then filter in python to only trigger on that rule name
9  Package with InnoScript