2012-12-25 22:24:19 C:\virus\vfd\'Home.vbs Sandboxed As Partially Limited
2012-12-25 22:24:34 C:\virus\vfd'Home.vbs Access COM Interface C:\Program Files\Internet Explorer\IEXPLORE.EXE
6.environment:
Windows XP Pro SP3 32bit
The content of the .vbs file.
The url contains a user name and a password.
Image of script in editor removed by moderator. This test case can be used to harvest IP addresses of our members. Please provide another test case by linking to an innocuous url like for example yahoo.com. Eric
I tried your script on Win8 but with target yahoo.com (ie.navigate(“http://yahoo.com”) but I get an error. That is running Proactive; I will test with defaults after this.
What is odd is that we would expect IE to be sandboxed because the script is sandboxed but it is not. I can see a possible leak when starting IE hidden and connecting to a web site related to the malicious intentions of the malware.
Did you try this in Proactive Configuration as well?
Edit. I changed to the default Internet Security Configuration and get the same vbs error. See attached image.
Thank you for the adapted script. I tried it and the scenario goes down like you described.
3. In the sandbox level, fully virtualized, the iexplore.exe can be sandboxed.
But the firewall does not popup an alert window for the IE.
With the firewall set to safe mode I don't get alerted when IE gets run. With the firewall set to custom policy (and no rule in Application Rules) I do get a pop up from the firewall.
I sent egemen a pm about your findings and asked him to comment on it.
It doesnt work here, my settings for comodo FW 5.12 are extremely restrictive.
the .vbs cannot start because of unrecognized file set to “blocked”.
I tried with partially limited and allowed the .vbs then it opens IE.
Okay, I changed the advice in my article to Restricted instead of Limited. I’m keeping an eye on this topic to see if a change is made to the way CIS works such that I can advise Limited again.