Some additional notes about malware testing on
Windows 8+ (Windows built-in security).
Hard_Configurator in the Recommended Settings (<Recommended SRP> + <Recommended Restrictions>) allows to run files in two modes:
1. 'Default Deny' mode
2. 'Install' mode
The first mode is invoked for files which are run by the User, when left clicking or pressing the Enter key.
The second mode is for bypassing the first mode by the User, when right clicking and choosing "Run As SmartScreen" from Explorer context menu. The second mode runs only EXE and MSI files - they are obligatory checked by SmartScreen Application Reputation, and if not blocked, they are run with Administrative Rights.
So, how can this security work for the common malware samples: *.exe, *.scr, *.com, *.doc, *.doc.exe, *.pdf.exe, *.pdf, *.vbs, *.js, *.ps1 ?
'Default Deny' mode.
- The files: *.exe, *.scr, *.com, *.doc.exe, *.pdf.exe, *.vbs, *.js, *.ps1 - will always be blocked.
- The files: *.doc, *.pdf - will always be allowed
- If *.doc, *.pdf files have embedded scripts or are going to use *.vbs, *.js, *.ps1 scripts - they will be blocked.
- PowerShell scripts ran filelessly from the remote servers will also be blocked (Constrained Language).
- If *.doc, *.pdf files have embedded scripts which try to load from the Internet and run from the disk the malicious *.exe, *.scr, *.com, *.doc.exe, *.pdf.exe, *.vbs, *.js, *.ps1 files - they also will be blocked.
- If *.doc, *.pdf files have embedded scripts which try to activate remote access - they will be blocked.
- If *.doc, *.pdf files have embedded malicious Internet links, then they will be allowed, except if the User has something like Adguard DNS that can block many of them.
Anyway, there are some other, ways to attack the system, so generally is recommended to use sandboxed applications which opens documents, photos, media files, or related to Internet.
'Install' mode.
In this mode, the User applies "Run As SmartScreen", so all files are blocked except MSI or EXE, which passed SmartScreen check. This mode is 'user dependent', if the user has the ability to bypass SmartScreen.
In this mode the files with a double extension (like *.doc.exe, *.pdf.exe) shoud not be tested, because they are prepared to fool the users, when left clicking or pressing the Enter key (covered by 'Default Deny' mode).
If allowed executables are going to use *.vbs, *.js, *.ps1 scripts or activate the remote access - they will be mostly blocked.
'Mostly blocked' means, that the malware additionally has to change some registry values to unblock the above actions.