Anti-Ransomware Kernel Driver
DartFilter is a Windows Kernel Minifilter driver that stops Ransomware activity through a Honeypot detection method, monitoring it's files.
NOTE: The driver was tested on Windows 10 Education Build 19041 and it's likely to work on new and recent Windows 10 versions.
- DartFilter intercept every PreCreateFile, PreWriteFile and PreSetFileInformation operation on the Honeypot
- Whenever a ransomware or any process tries to perform one of the operations mentioned in our Honeypot, the process gets terminated and returns with an access denied status
Here are the installation steps required to load the driver in your system:
Open PowerShell/Cmd in Administrator mode and run the following command to allow Windows to self-sign Kernel drivers:
Bcdedit.exe -set TESTSIGNING ON
After running the command, restart the computer and you'll be in Test Mode.
NOTE: If you wish to turn the Test Mode off, execute the same command with the OFF argument (Bcdedit.exe -set TESTSIGNING OFF)
In the "bin" folder on the repository, right-click on the DartFilter.inf file and select the "Install" option.
Now, after installing DartFilter, we must start the service. Opening the PowerShell/Cmd in Administrator mode, run the following command to start or stop the service:
sc start DartFilter
sc stop DartFilter
To create the Honeypot, make sure to add decoy files in a folder that contains "_darthoney" added to it's name. If you'd like to, feel free to download the Honeypot folder in this repository.
- DebugView to see debug messages of the driver