I was testing a version of the (in)famous worm Gruel (MD5: b0feccddd78039aed7f1d68dae4d73d3) in a virtual environment with the following setup:
Windows 7 Professional 64 bit
8 GB Ram
CIS 188.8.131.5292 with no antivirus enabled, HIPS disabled and Proactive Security
Software running the VM: Virtualbox 5.0.10 under a Fedora x64 23
I was testing a fully virtualized sandbox with full restriction but here some interesting screenshots
If you keep executing the worm, the worm can terminate explorer.exe but no registry key is touched. You should restart Windows for having a normal execution of the operating system.
Even removing the “Enable file source tracking” nothing is changing.
Even removing the check for installers nothing is changing
If I keep the standard rules enabled we have the same results
I don’t think it’s a bug, because, if I remove the restrictions the program go “fully virtualized”. Perhaps is a wrong configuration? But why Comodo keeps to put into “partially limited”? If I put the Windows calculator executable, comodo sandbox put the calc.exe into “untrusted” mode.
PS: The worm is available via PM to moderators only.
EDIT: Here the calc.exe in “untrusted” mode with the same rules in the “configuration section”: http://postimg.org/image/oa3j1c4wl/
It could be an issue with CIS being run in Virtualbox as it has been stated before that CIS does not work well with Virtualbox, however I was able to get the sample and test on a physical machine and CIS sandboxed it as untrusted using the same sandbox settings as you though I had disabled file-source tracking before downloading and extracting the sample.
Sorry I misunderstood, I thought you meant that if the rule said “Virtualized & Untrusted” then programs launched with administrator rights are launched as “Non-Virtualized & Partially limited” but I think what you meant was it’s run as “Virtualized & Partially Limited” Which I can verify.
However even if run as Virtualized and Partially limited this part shouldn’t be possible “the worm can terminate explorer.exe” unless OP means it can kill an instance of explorer.exe run virtualized. Virtualized applications shouldn’t be able to terminate processes outside of the virtualized environment… Actually I tested this just now and virtualized applications can’t normally kill non-virtualized applications but they can force kill them… I don’t think that is by design, do you know if there is any bug report for it? Otherwise I’ll make one. Made a bug report, 1698.
Yes, it killed the real explorer.exe not the sandboxed one. But, I will try with a real piece of hardware and not a VM since I have an old PC that can run Win 7, a DMZ so I will not infect the LAN network.
Yup the UAC logo is shown but we are talking about a VM
!ot! Anyway it’s nice that community it’s live again: some time ago it wasn’t like this IMHO !ot!
Just a little update:
I have tried on a real machine with Windows 10 x64 and the problem is still here with the same rules applied from the first post. Maybe 8 / 8.1 is different?
Anyway this time i’ve tried with the “Administrator” user so no UAC message popped out.
Made a bug report, 1698.
Since I don’t see this bug report on this forum, I think it’s in the Comodo’s internal bugtracker? Right?
Yes, although it’s specifically about the issue with sandboxed applications being able to force terminate non-sandboxed applications, the bug report in question doesn’t reference the malware since I don’t actually know if this is the technique the malware uses. In other words I’ve just made a general bug report for the force terminate issue I experienced when using KillSwitch sandboxed.