For my information, what browser and download manager did you use to get the ISO file?
It is unimportant because the ISO file is not an executable/application. In my tests I used Edge.
We just need to remove the "file age" criteria for the policies; Comodo should then block your and
@vitao's POCs.
Action - Run Virtually, File Group - All Applications, File Origin - Removable Media, File Rating - Trusted
Action - Run Virtually, File Group - All Applications, File Origin - Internet, File Rating - Trusted
Action - Run Virtually, File Group - All Applications, File Rating - Unrecognized (default policy)
These rules should work in the same way as:
Action - Run Virtually, File Group - All Applications, File Origin - Removable Media
Action - Run Virtually, File Group - All Applications, File Origin - Internet
Action - Run Virtually, File Group - All Applications, File Rating - Unrecognized (default policy)
Simply, all applications executed from Removable Media and Internet are contained. The Unrecognized applications are contained everywhere. The Proactive setup includes also three Block rules for Malicious Applications, Suspicious Locations, and Containment Folders
These settings will contain most of my POCs and prevent most malware including 0-day ones. It is a very strong setup.
It is possible to bypass such a setup by using shortcuts + abusing the Trusted applications already installed in the system (LOLBins, MS Office, etc.). For example, Comodo's challenge method used in my video is not blocked (shortcut + LOLBin abused) and all my POCs are not blocked when running office macros.
I would also enable Embedded Code Detection for cmd[.]exe (to prevent many attacks via shortcuts), and block macros in office applications.