- Jul 27, 2017
- 775
Disclaimer: Experimental setup for testing the effectiveness of Windows SmartScreen and script restrictions against 0-day malware samples. This test is suitable for users with more knowledge about Windows built-in security features.
changed configuration from 7 January 2019:
1. Containment: VirtualBox 5.1.38
2. Windows: 10 LTSB
3. VPN: CyberGhost
4. Product: Windows SmartScreen (activated by Hard_Configurator with recommended SRP and restrictions)
5. Office: LibreOffice (standard settings)
1. Containment: VirtualBox 5.1.38
2. Windows: 10 Home
3. VPN: CyberGhost
4. Product: Windows SmartScreen (activated by Hard_Configurator with recommended SRP and restrictions)
5. Office: LibreOffice 6.0 (lowest Macro protection level)
2. Windows: 10 Home
3. VPN: CyberGhost
4. Product: Windows SmartScreen (activated by Hard_Configurator with recommended SRP and restrictions)
5. Office: LibreOffice 6.0 (lowest Macro protection level)
changed configuration from 7 January 2019:
1. Containment: VirtualBox 5.1.38
2. Windows: 10 LTSB
3. VPN: CyberGhost
4. Product: Windows SmartScreen (activated by Hard_Configurator with recommended SRP and restrictions)
5. Office: LibreOffice (standard settings)
January 2019 | Amount of samples | Samples that have harmed the system/ changed system configuration | Files aren't touched/encrypted | Thread link |
---|---|---|---|---|
1.1.2019 - 3.1.2019 | Nothing tested, since I had no access yet. | - | - | - |
4.1.2019 | 6 | 0 | yes | link |
5.1.2019 | 3 | 0 | yes | link |
6.1.2019 | 1 | 0 | yes | link |
6.1.2019 | 1 | 0 | yes | link |
7.1.2019 | 14 | 0 | yes | link |
8.1.2019 | 9 | 0 | yes | link |
8.1.2019 | 1 | 0 | yes | link |
9.1.2019 | 8 | 0 | yes | link |
10.1.2019 | 13 | 0 | yes | link |
Last edited: