- Dec 29, 2014
- 1,716
If you see this behavior, it means Comodo is catching an in-memory script. This is "embedded code detection" in action. It was added in Comodo 10. The older "heuristic command line analysis" will not catch an in-memory script and magically turn it into a file. It needs an already existing script file in order to work.
I hope this is clear.
OK, thanks for the clarification. I see numerous instances of tempscrpt with a script that generates a copy of a file, edits the file, and then replaces the file. Once I set the HIPs allow and containment ignore rules for each tempscrpt, Comodo, is quiet about them. This script sequence also references a .bat along the way using cscript and wscript to do the job. The edit is for an application setting .ini that seems to default sometimes. I run the script on a schedule to keep the .ini settings as I require them.
ERP catches the command lines passed to rundll32 to load a dll. Other programs that do this: ReHIPS, Voodooshield, Bouncer.
That's a very solid protection consideration from NVT, considering it's free. Unfortunately, I can't run VS with the scripts I have. It simply will not remember the allow (whitelist) rules I create for the scripts. I tried everything. Even won a year of free VS when Dan ran that giveaway a couple of years back. I tried excluding the folder and everything...still the alerts. Maybe it was something to do with the file drop in the script process.
The script process I have is kind of a nice way to get a look at your protection to see how it is functioning. I can pass the scripts to you if you like with a README. You would have to be able to edit one of them, so that the path of the file to be changed is correct. Also, you will have to edit the text string to be located in the target and then the change to the text to be made. Actually you could use the same phrasing in your target file used in the .ini here and simply do away with any need for this second edit to the script. Just set the value in the .ini (target) to a different value than the one in the .bat script. Next run the .bat and see if the file is edited. If you run it from the desktop, you might even see the drop happen. There is a second file that the .bat references called REPL.bat (short for Replace). It's used kind of like a .dll to actually add the functionality for the change to the very short initialization script. Only requirement for REPL.bat is that is must be in the location of the file to be edited. You could actually just put all 3 files on the desktop no issues.
Maybe I will get a chance to look at ERP 4.0 later. My ONLY issue is that I have ERP 3.1 running and keeping settings in SUA on this computer. No idea why it functions properly in SUA on this one computer, but I can't seem to achieve the same on any other machines here. Won't retain a password or any other settings in SUA. Yes, command lines, but that's all (I know 4.0 fixes this).
I have had the ERP protection disabled for months now, contemplating what to do with 3.1. I don't want to be hasty with a choice, because I'm not sure whether I might start the entire command line dialog over...it's getting a little bit long, etc. 3.1 with the LONG list of vulnerables I have does seem to do what I would like system-wise. Overall, however, it also does seem to bring occasional issues with things like changing from one account to another. This is due to the way it was initially configured. I ran it the first time for about 30 minutes and then turned off the "allow windows processes" rule. At that point, I hadn't changed from one account to another, so some Windows processes weren't auto-allowed. Anyway, CTRL+ALT+DEL seems to bring to the screen the NVT alert blocking things when something along these lines or during boot occurs.
Blocking high privilege scripts protects better against kernel exploits etc, but it can interfere with system processes if the program is missing internal rules to allow safe system processes. The required rules change with time.
This is the money option for me...blocking the high privilege scripts, because I run some software that isn't recognized or loved by the cloud in Comodo. Even with ERP and "Allow Windows processes" turned off, I have been satisfied with the alerts with ERP. I could trust it for command line parsing alerts. Just have to make up my mind about how to use the program and whether I should make the change to 4.0. It's difficult for me to find the time to approach the configuration process thoroughly and properly. Maybe I am beginning to see an opportunity to carve out a little time...just not sure when. In the end, I do not intrinsically like the idea of ERP and Comodo together, but limiting ERP to the monitoring of vulnerables, maybe even just the command line parsers, is an inviting concept to consider for me.