I have a question about how ransomware works.
According to the authors of this paper: https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf (page 2 - 3) , class C is: ransomware reads the original file, then creates a new, independent file containing the encrypted contents and deletes or overwrites (via a move) the original file. This class uses two independent access streams to read and write the data.
Could someone explain this a bit more? Because what I'm wondering is: ransomware opens the original file, then creates a new independent file (okay, so far so good), then copies the unencrypted content from the original file into the new file(?), encrypts it (so it encrypts the content of the new file) and overwrites or deletes the original file?
Or does it encrypt the content of the original file, copy the encrypted content to the new file and then delete the original file?
It seems to be quite similar to scenario 3 of this file (page 6): https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_kharraz.pdf
and one more general question: Is it possible to encrypt a file without opening it? So without creating an IRP_Read or IRP_Create?
Thank you very much.