- Apr 13, 2013
- 3,224
Don't know if this will be of interest to anyone, but will post it anyway.
As there are always questions about which AV product to pick and should a given test be trusted, I was just curious and tried a few things for giggles.
To begin, let's consider Windows Firewall. As one may or may not want it enabled, one can either disable it manually through the GUI or instead enter a command (running as Administrator) to do so. But if instead we would rather create an executable to accomplish our goal (of disabling WF), how would a typical AV react?
The test:
A script to disable WF was written. It was converted to an executable in different ways (don't real know if one would actually consider any of these truly malicious, but that's not really the point):
1). a baseline version with the option to show the command box (visible) on run, or to hide the command box (invisible). These will be the baseline.
2). to add run as Administrator to the above baseline programs.
3). To add an icon to the baseline programs
4). To compress the baseline thingies with something like UPX
(Please note that ONLY the exe's that would be run with Admin Privilege will actually disable the Firewall)
Results: when run against various AV applications, it was seen that stuff like Microsoft, Kaspersky, Emsisoft would not find issue with any of the above, while Symantec and McAfee flagged them all.
G-Data found that adding an icon to the Invisible FW baseline exe to be fine, as was the Visible form but will flag as malicious the Invisible form without an icon (Win32.Trojan.PSE.DR6CWW).
Avira didn't have an issue with any except hated the compressed versions, both of which were blocked.
Avast found all fine except the Invisible Icon exe which was blocked.
Conclusion- obviously I have much too much time on my hands this morning.
As there are always questions about which AV product to pick and should a given test be trusted, I was just curious and tried a few things for giggles.
To begin, let's consider Windows Firewall. As one may or may not want it enabled, one can either disable it manually through the GUI or instead enter a command (running as Administrator) to do so. But if instead we would rather create an executable to accomplish our goal (of disabling WF), how would a typical AV react?
The test:
A script to disable WF was written. It was converted to an executable in different ways (don't real know if one would actually consider any of these truly malicious, but that's not really the point):
1). a baseline version with the option to show the command box (visible) on run, or to hide the command box (invisible). These will be the baseline.
2). to add run as Administrator to the above baseline programs.
3). To add an icon to the baseline programs
4). To compress the baseline thingies with something like UPX
(Please note that ONLY the exe's that would be run with Admin Privilege will actually disable the Firewall)
Results: when run against various AV applications, it was seen that stuff like Microsoft, Kaspersky, Emsisoft would not find issue with any of the above, while Symantec and McAfee flagged them all.
G-Data found that adding an icon to the Invisible FW baseline exe to be fine, as was the Visible form but will flag as malicious the Invisible form without an icon (Win32.Trojan.PSE.DR6CWW).
Avira didn't have an issue with any except hated the compressed versions, both of which were blocked.
Avast found all fine except the Invisible Icon exe which was blocked.
Conclusion- obviously I have much too much time on my hands this morning.