Hi, I have written something about this problem here https://forums.comodo.com/format-verified-issue-reports-cis/limited-and-restricted-block-screen-capture-but-untrusted-does-not-m399-t95001.30.html
It’s a well-know bug CIS 6 and CIS 7 had with keyloggers. Now that I have CIS 8 installed, I have tried to download the Spyshelter tests (AntiTest.exe, downloadable from here https://www.spyshelter.com/download/AntiTest.zip).
This is the summary of my results
CONFIGURATION
Windows Vista Home Premium 32bit with SP2
CIS 8.1.0.4426 in Proactive Security mode
Antivirus: stateful
Firewall: safe
HIPS: safe
Auto-Sandbox: enabled
Let’s focus on the Auto-Sandbox rule for unrecognized files
-
RUN VIRTUALIZED (default setting)
CIS can pass the screenshot tests 1b, 2b, 3b, 4b,5b and 6, but all the other tests fail. The result doesn’t change if you modify the restriction level from “Options”.
Then, I don’t know if the virtual environment could prevent a real keylogger to send information out of my PC, but the fact is that CIS fails most of Spyshelter tests -
RUN LIMITED
AntiTest.exe can’t even start. You get a Windows error message just after CIS sandbox pop-up. If you click “don’t sandbox again”, then AntiTest.exe can run and CIS fails every test, no matter what restriction level you set.
This is strange, because with CIS 6 and 7 the result was (for the screenshot test):
Fully Virtualized - Total Failure
Partially Limited - Total Failure
Limited - 100% Blocked
Restricted - 100% Blocked
Untrusted - Failed 3 out of 11 (because of the bug mentioned above) -
BLOCK
AntiTest.exe can’t even start. You get a Windows error message just after CIS sandbox pop-up. If you click “don’t sandbox again”, then AntiTest.exe can run and CIS fails every test
This is quite bad, in my opinion. If you click “don’t sandbox again”, CIS 8 will add the file to the trust list and it won’t warn you about anything -
REMOVE THE RULE FOR UNRECOGNIZED FILES
In this way, the HIPS will react instead of the auto-sandbox.
When you click on AntiTest.exe you get a HIPS pop-up to alert you. Even if you allow it, you’ll get a pop-up when the app tries to access a protected key or location and you’ll get a pop-up when you try to perform a test (you’ll get a pop-up for every test).
Of course, if you allow this last pop-up, CIS will fail the test… but at least you’ll get several warnings that let you understand what the file is trying to do and help you in choosing whether is better to block it or let it go.
CONCLUSIONS
I’m not a fan on virtualization, especially considering the several bugs, workarounds and strange behaviors, like the one I wrote above.
But it seems that CIS developers have pushed a lot on virtualization, while not improving (I’d say worsening) the “run limited” choice.
What I have personally done is to choose the options No. 4 and remove the rules for unrecognized files.
Maybe I’ll get more HIPS pop-ups, but at least I can see what happens and decide how CIS should react.
If I have a doubt about a file, I can block it first, then run it as fully virtualized by right-clicking on the exe and choosing the option.
Does anyone have any other ideas or explanations?
Thanks