- Jan 8, 2017
- 1,320
@silversurfer, @Der.Reisende , we could get this sample (SilentSpring.exe) from the video to test in MH?
Will be included in the latest pack.@silversurfer, @Der.Reisende , we could get this sample (SilentSpring.exe) from the video to test in MH?
LOLIn 3:20 the behavior blocker moved the wscript.exe to quarantine (FPs) ??
and didn't delete the GrandCrab.vbs
LOL
You can see a few seconds beforehand that wscript.exe was terminated when the virus alert displayed, then the wscript.exe quarantine alert was pending and thus was shown after the virus alert was closed.
That's an interesting thing to notice, I am surprised they quarantined a Windows process (wscript.exe) instead of only the script executed by it.
I don't know, unless we have the samples used to test with anything could have happened. It could have said one thing and not really done what it said, maybe it meant that the script executing under wscript.exe was quarantined.so it detect the payload not the vbs malware
and quarantine the wscript.exe which is safe
G-DATA can do it if it wants. It has a Windows Service (session 0, SYSTEM rights) or kernel-mode device drivers which would be able to do it if it wanted to.(ps- if on a Win10 system, nothing should be able to delete/move/quarantine wscript as this resides in the system32 folder. UAC, even at the Off setting, will prevent this. What no doubt actually occurred is that this one specific process was just terminated).
WHAT!just like Trend Micro putting UAC to Default even if you had set it at max.
WHAT!
I can't believe that (well I can since I believe you), but that is absolutely ridiculous. How dare they, how is that enhancing protection?!
They could just remember what setting it was on at installation time or monitor changes to the config to revert it properly.Trend Micro on detection of threat does 'many' things to a system. Resetting the UAC is just one of the things it does - without asking. It takes a few too many liberties IMO.