Author Topic: Comodo firewall bypassed by signed malware  (Read 4701 times)

Offline barry1976

  • Comodo Loves me
  • ****
  • Posts: 130
Comodo firewall bypassed by signed malware
« on: May 01, 2017, 07:16:17 AM »
Hi all.

there is a topic posted on malwaretips.com by one of the members , that a signed piece of malware bypassed cfw 10.
he posted a youtube link where he demonstrated the bypass :

https://www.youtube.com/watch?v=gWo0XnLHr3g

here is what he did in his test :

1. check Comodo firewall settings
2. delete all trusted vendors
3. add some malware to see if Comodo is working OK
4. check that one malware at VT
5. run malware and watch:
- C:\Users\Av-Gurus\AppData\Local
- Task manager startup
- network connection

he later did his test with hips module turned on , but the outcome was the same.

the firewall was configured , what has been commonly known as " cruelsisters settings " , which are as follows :
* proactive configuration.
firewall :

* do not show popups , block requests

* hips disabled

* sandbox do virtualize acces to unchecked
* do not show privalidge alerts , block


* auto sandbox :

run virtually : all aplications : restricted



eset internet security - nvt syshardener - mbae beta - adguard desktp

Offline UmbraWraith

  • Comodo Loves me
  • ****
  • Posts: 180
  • Emsisoft Community Manager
Re: Comodo firewall bypassed by signed malware
« Reply #1 on: May 01, 2017, 07:34:29 AM »
Bypass because the malware was set as trusted by Comodo.

-  if HIPS is on paranoid , file is blocked.
- if cloud lookup is disabled , HIPS in safe mode  flag it.
 
Hardened Win10 CU (All PCs): SUA | UAC (Max) | Smartscreen (Block) | WinFW | WinDef (w/ PUP)
All PCs: EAM | Appguard (beta) | Adguard (Beta) | Simple DNScrypt
Main PC: Rollback RX Pro | ReHIPS (beta)

Offline liosant

  • Star Group
  • Comodo's Hero
  • *****
  • Posts: 1517
  • GOD cure me epilepsy and atrophy - Sou brasileiro!
Re: Comodo firewall bypassed by signed malware
« Reply #2 on: May 01, 2017, 07:41:21 AM »
I did not see or was not aware enough, but you did not check the "file list". Comodo may have classified the file as trusted (it seems, the option does not display alerts > block requests, is only valid for unknown files). Fortunately or unfortunately, this error of practicality is not exclusive to the CIS

As the user said Umbra Polaris, if you turn off cloud scanning when you install the program, you may be alerted or have the file blocked.

Can you share the link with these files?

Offline UmbraWraith

  • Comodo Loves me
  • ****
  • Posts: 180
  • Emsisoft Community Manager
Re: Comodo firewall bypassed by signed malware
« Reply #3 on: May 01, 2017, 07:57:09 AM »
Comodo may have classified the file as trusted (it seems, the option does not display alerts > block requests, is only valid for unknown files).
They did, hence why it was allowed to run.

Trusted files are not stopped by sandbox or HIPS unless Paranoid Mode.
« Last Edit: May 01, 2017, 08:01:05 AM by Umbra Polaris »
Hardened Win10 CU (All PCs): SUA | UAC (Max) | Smartscreen (Block) | WinFW | WinDef (w/ PUP)
All PCs: EAM | Appguard (beta) | Adguard (Beta) | Simple DNScrypt
Main PC: Rollback RX Pro | ReHIPS (beta)

Offline kronos

  • Product Translator
  • Comodo's Hero
  • *****
  • Posts: 265
Re: Comodo firewall bypassed by signed malware
« Reply #4 on: May 01, 2017, 08:59:13 AM »
This should be the SHA256 signature: 190d5c8de27115b98484d653dff246fc05ce02ac69fedd009e469d7535f3faeb
While this should be the VT report of the file: https://www.virustotal.com/en/file/190d5c8de27115b98484d653dff246fc05ce02ac69fedd009e469d7535f3faeb/analysis/1493043977/

From what I see, Comodo AV today can intercept the file as TrojWare.Win32.Emotet.~AO with the signatures (here a more recent report).
Anyway, even if the malware isn't trusted anymore, the entire CIS solution was bypassed because the file was Trusted by Comodo.
« Last Edit: May 01, 2017, 09:00:58 AM by kronos »

Offline cruelsister

  • Comodo Loves me
  • ****
  • Posts: 121
Re: Comodo firewall bypassed by signed malware
« Reply #5 on: May 01, 2017, 09:19:20 AM »
The entire issue was that the file was listed as Trusted (obviously a mistake). When the original malware was run it was allowed to create a directory in AppData/Local, drop the payload into it, and then set itself up for boot persistence. The file itself is just a garden variety info-stealer; similar malware are all blocked, and any manipulation to this file will also be blocked.

It is important to note that in order for any sort of info stealer to work it must be allowed to access the network to send stolen data to Command. In the case of this malware even though it was allowed to drop and autostart, the firewall stopped transmission of any data by the malware as it blocked the initial connection to a Paris server which in turn would route stuff to Command (also blocked is a connection to a server in Atlanta with recently has been a favorite for a bunch of other info stealers). So although the dropped payload remained in memory, it essentially was just hanging out looking stupid.

(note to Kronos- as of 1 minute ago if one uses Comodo Firewall there would be no AV alert at all. And since I'm already here, do the developers realize that the Firewall component of CF initially blocks vkise.exe from connecting to Comodo? I personally could care less, but it will seem odd to newbies...).
« Last Edit: May 01, 2017, 09:36:58 AM by cruelsister »

Offline shmu26

  • Comodo's Hero
  • *****
  • Posts: 238
Re: Comodo firewall bypassed by signed malware
« Reply #6 on: May 01, 2017, 09:34:44 AM »
This type of repeating fiasco does not inspire confidence in Comodo.
The implementation of cloud lookup needs to be rethought.

Offline cruelsister

  • Comodo Loves me
  • ****
  • Posts: 121
Re: Comodo firewall bypassed by signed malware
« Reply #7 on: May 01, 2017, 09:39:33 AM »
The malware was blocked by the Firewall from connecting out, so nothing malicious occurred. It was a mess up for this one particular file so the World will not End.

And I've never seen something like this before, so it certainly is not a repeating issue.

Offline kronos

  • Product Translator
  • Comodo's Hero
  • *****
  • Posts: 265
Re: Comodo firewall bypassed by signed malware
« Reply #8 on: May 01, 2017, 09:50:20 AM »
(note to Kronos- as of 1 minute ago if one uses Comodo Firewall there would be no AV alert at all. And since I'm already here, do the developers realize that the Firewall component of CF initially blocks vkise.exe from connecting to Comodo? I personally could care less, but it will seem odd to newbies...).
Hi cruelsister,
I already followed the MT thread from the origin.
I made the AV detection digression just to conclude that, since the file is detected as malware, probably has already been removed from the trusted list by Comodo. Sad to know it's not the case.

BTW I don't know how exactly the cloud lookup works, I doubt it's directly linked with AV database but I was hoping these kind of updates to be spread quickly, since they are unusual but make uneffective all layers. Sad to know it's not the case either.

Offline shmu26

  • Comodo's Hero
  • *****
  • Posts: 238
Re: Comodo firewall bypassed by signed malware
« Reply #9 on: May 01, 2017, 09:57:26 AM »
The malware was blocked by the Firewall from connecting out, so nothing malicious occurred. It was a mess up for this one particular file so the World will not End.

And I've never seen something like this before, so it certainly is not a repeating issue.
Just curious how things work: if the file was seen as trusted, why did firewall block it? Aren't trusted files automatically allowed internet access, when firewall is in safe mode?

Offline cruelsister

  • Comodo Loves me
  • ****
  • Posts: 121
Re: Comodo firewall bypassed by signed malware
« Reply #10 on: May 01, 2017, 10:08:17 AM »
K- for whatever reason there is a discrepancy between what CIS and CF will detect on file run. For instance, in the last video I made CIS would have detected and deleted 5 of the 9 samples I used, whereas CF only detected 1. Personally I could care less as all 9 were contained in the sandbox anyway and resulted in zero system changes.

Also, I just let the malware file that this topic is about for a few minutes and noticed 35 Firewall blocks! Poor malware- try as it might it just can't connect to Mama!

M

Shmu- just saw your post- although the original malware file was trusted remember that this was just the carrier for the payload; the actual dropped payload (workflowscroll.exe) is what was stopped by the Firewall from connecting out.

Addendum- CF just detected the original file by the Cloud AV.
« Last Edit: May 01, 2017, 10:17:42 AM by cruelsister »

Offline futuretech

  • Global Moderator
  • Comodo's Hero
  • *****
  • Posts: 5127
Re: Comodo firewall bypassed by signed malware
« Reply #11 on: May 01, 2017, 11:24:52 AM »
Hi cruelsister,
I already followed the MT thread from the origin.
I made the AV detection digression just to conclude that, since the file is detected as malware, probably has already been removed from the trusted list by Comodo. Sad to know it's not the case.

BTW I don't know how exactly the cloud lookup works, I doubt it's directly linked with AV database but I was hoping these kind of updates to be spread quickly, since they are unusual but make uneffective all layers. Sad to know it's not the case either.
Cloud lookup is linked to the AV by hash only. Also PUA are detected by cloud lookup if the file rating setting "detect potentially unwanted applications" is enabled.

Just curious how things work: if the file was seen as trusted, why did firewall block it? Aren't trusted files automatically allowed internet access, when firewall is in safe mode?
Correct the do not show alerts setting only applies to situations when an alert would be shown to ask the user if action should be allowed or blocked for applications rated as unknown or malicious when set to safe mode. In this case the dropped executable was the application that was trying to connect to the internet and was blocked. The dropper was accidentally rated as trusted but it drops another file that was rated as unknown.

Offline shmu26

  • Comodo's Hero
  • *****
  • Posts: 238
Re: Comodo firewall bypassed by signed malware
« Reply #12 on: May 01, 2017, 11:30:36 AM »
Cloud lookup is linked to the AV by hash only. Also PUA are detected by cloud lookup if the file rating setting "detect potentially unwanted applications" is enabled.
Correct the do not show alerts setting only applies to situations when an alert would be shown to ask the user if action should be allowed or blocked for applications rated as unknown or malicious when set to safe mode. In this case the dropped executable was the application that was trying to connect to the internet and was blocked. The dropper was accidentally rated as trusted but it drops another file that was rated as unknown.
I think I get it now. The payload, although rated as unknown, was able to run because it started early, before Comodo protection kicked in.
But it was not able to make an internet connection that fast, so Comodo firewall blocked it.

Offline shmu26

  • Comodo's Hero
  • *****
  • Posts: 238
Re: Comodo firewall bypassed by signed malware
« Reply #13 on: May 01, 2017, 11:43:43 AM »
I think I get it now. The payload, although rated as unknown, was able to run because it started early, before Comodo protection kicked in.
But it was not able to make an internet connection that fast, so Comodo firewall blocked it.
But that is at CS firewall settings.
Whereas at default firewall settings, the user would get a prompt, instead of a block.
Correct?

Offline futuretech

  • Global Moderator
  • Comodo's Hero
  • *****
  • Posts: 5127
Re: Comodo firewall bypassed by signed malware
« Reply #14 on: May 01, 2017, 11:54:48 AM »
But that is at CS firewall settings.
Whereas at default firewall settings, the user would get a prompt, instead of a block.
Correct?
Default proactive config you get an alert, default internet security config it is set to allow.

 

Free Endpoint Protection
Seo4Smf 2.0 © SmfMod.Com Smf Destek