Test continuation with script trojan-downloaders.
The testing scripts adopted 7 different methods of downloading files and 8 different methods of executing files from scripts. I used VBScript and PowerShell.
Kaspersky Internet Security 2019 (KIS).
KIS detection was much better as compared to all tested products. It detected all trojan-downloaders, but over 50% samples were allowed to run as Low Restricted.
Most VBScript samples were quarantined, except a few which were allowed as Low Restricted.
All scripts which used Bitsadmin were blocked (could not run as Low Restricted).
All PowerShell scripts were allowed to run as Low Restricted - that is not a perfect solution, because of the below note from Kaspersky (
How to configure applications' rights and protected resources' properties by using Application Control in Kaspersky Internet Security 2015):
"...
However, these applications have received low value of the threat rating (a special index that shows how dangerous an application could be for the system based on a number of criteria). They are allowed to perform some operations, such as accessing other processes, controlling the system, and accessing the network without notifying the user. However, the user's permission is required for most operations."
It would be much better to block them or run as High Restricted.
One can ask the similar question as for Bitdefender. Why some scripts are blocked and the rest are not? Most VBScript samples did the same as PowerShell.
KIS also can benefit from adopting an additional application for script blocking.