Hello everybody,
I was testing a version of the (in)famous worm Gruel (MD5: b0feccddd78039aed7f1d68dae4d73d3) in a virtual environment with the following setup:
Windows 7 Professional 64 bit
8 GB Ram
CIS 8.2.0.4792 with no antivirus enabled, HIPS disabled and Proactive Security
Software running the VM: Virtualbox 5.0.10 under a Fedora x64 23
I was testing a fully virtualized sandbox with full restriction but here some interesting screenshots
==CONFIGURATION==
==HOW THE WORM IS SANDBOXED==
If you keep executing the worm, the worm can terminate explorer.exe but no registry key is touched. You should restart Windows for having a normal execution of the operating system.
* Even removing the "Enable file source tracking" nothing is changing.
* Even removing the check for installers nothing is changing
* If I keep the standard rules enabled we have the same results
I don't think it's a bug, because, if I remove the restrictions the program go "fully virtualized". Perhaps is a wrong configuration? But why Comodo keeps to put into "partially limited"? If I put the Windows calculator executable, comodo sandbox put the calc.exe into "untrusted" mode.
For the curious I could upload gruel to the malware hub, but if you search the md5 you can find it @ malwr.com (you must be registered)
EDIT: Here the calc.exe in "untrusted" mode with the same rules in the "configuration section":
View image: calc exe
EDIT: This post is the same on the comodo forums, sorry