Deciphering Ransomware: Strategic API Usage and Behavioral Patterns for Advanced Detection Techniques

Authors

  • Khalid Zirari Institut National des Postes et Télécommunications, Rabat, Morocco https://orcid.org/0009-0006-7840-0188
  • Hamza Kamal Idrissi Institut National des Postes et Télécommunications, Rabat, Morocco https://orcid.org/0000-0002-3344-6645
  • Ahmed El-Yahyaoui Mohammed V University in Rabat, Rabat, Morocco https://orcid.org/0000-0002-9385-7315
  • Hicham Bensaid Institut National des Postes et Télécommunications, Rabat, Morocco
  • Abdeslam En-Nouaary Institut National des Postes et Télécommunications, Rabat, Morocco

DOI:

https://doi.org/10.3991/ijim.v19i10.49245

Keywords:

Ransomware Detection, Behavioral Analysis, Dataset, AI-based Detection, API Call Patterns, Cuckoo Sandbox, Cybersecurity

Abstract


Ransomware has emerged as a critical cybersecurity threat, inflicting severe financial and operational damage across industries. Traditional signature-based detection systems struggle to detect zero-day and evolving ransomware strains, as they rely on known signatures that cannot capture new tactics. In contrast, behavioral detection methods analyze ransomware actions and patterns, making them more effective. Integrating artificial intelligence (AI) can further improve detection rates; however, effective AI models require diverse, up-to-date, and representative data. Previous research has often focused on isolated aspects of ransomware behavior. Our study addresses these gaps by providing a publicly accessible, up-to-date dataset covering multiple ransomware variants and families, including polymorphic and obfuscated strains not comprehensively explored in prior literature. Additionally, our approach identifies extensive ransomware metrics, including network interactions, registry modifications, file system changes, and low-level API call patterns, enabling real-time detection of malicious activities. Through a comprehensive behavior-based analysis of over 200 recent ransomware samples using the Cuckoo Sandbox platform and custom Python scripts, our study provides cybersecurity practitioners with valuable data and actionable insights, supporting faster responses, improved threat detection, and a proactive stance against evolving risks.

Downloads

Published

2025-05-22

How to Cite

Zirari, K., Idrissi, H. K., El-Yahyaoui, A., Bensaid, H., & En-Nouaary, A. (2025). Deciphering Ransomware: Strategic API Usage and Behavioral Patterns for Advanced Detection Techniques. International Journal of Interactive Mobile Technologies (iJIM), 19(10), pp. 199–221. https://doi.org/10.3991/ijim.v19i10.49245

Issue

Section

Papers