- Mar 28, 2017
- 263
Hello,
My life: Thanks to @cruelsister 's video, I'm switching since a week to Commodo Firewall + 360TS.
Since a few years, I was living in a cavern with avira + windows firewall control (sphynx) and was trusting av-comp, and never had heard of behavior blocker. But I've never been infected.
My question is: how can I diagnose if something running in the Sandbox is legitimate ?
Most of the time, the execution in the SB will fail...
There are some simple cases:
- an unique exe or dll: I upload it to Virustotal. (I'm already doing this since many years, with caution of the date of the exe, the date of last analysis...)
- a game bought on steam: I make the assumption it is safe. My last case was Chivalry. I'm tempted to add a rule to ignore the steamlibrary folder (I hope it's safe to do that !).
But, other case are less simple:
- something complex with many dll: I cannot upload everything to VT
- with "heuristic command analysis", the msiexec of clamwin is going to the sandbox. I know clamwin should be safe, but why is it going to SB, and others msiexec not ? How can I trust another piece of software that I want to test ?
In the videos, our sister is watching the activity with killswitch or task manager, ok. In some videos we are seeing some exe running, some doc files beeing screwed (not with CF ;-) ) , but when we are in front of an installer that just crash, how can we handle the diagnosis ?
Other thing: when something is going to the SB, sometimes it's because of the file rating "unknown". But sometimes it's caused by the options of the HIPS (hips off, but I know some options are still operating: command line analysis, embedded code detection...). It's sad that the log is not saying why. (maybe it's a noob remark, sorry)
regards,
My life: Thanks to @cruelsister 's video, I'm switching since a week to Commodo Firewall + 360TS.
Since a few years, I was living in a cavern with avira + windows firewall control (sphynx) and was trusting av-comp, and never had heard of behavior blocker. But I've never been infected.
My question is: how can I diagnose if something running in the Sandbox is legitimate ?
Most of the time, the execution in the SB will fail...
There are some simple cases:
- an unique exe or dll: I upload it to Virustotal. (I'm already doing this since many years, with caution of the date of the exe, the date of last analysis...)
- a game bought on steam: I make the assumption it is safe. My last case was Chivalry. I'm tempted to add a rule to ignore the steamlibrary folder (I hope it's safe to do that !).
But, other case are less simple:
- something complex with many dll: I cannot upload everything to VT
- with "heuristic command analysis", the msiexec of clamwin is going to the sandbox. I know clamwin should be safe, but why is it going to SB, and others msiexec not ? How can I trust another piece of software that I want to test ?
In the videos, our sister is watching the activity with killswitch or task manager, ok. In some videos we are seeing some exe running, some doc files beeing screwed (not with CF ;-) ) , but when we are in front of an installer that just crash, how can we handle the diagnosis ?
Other thing: when something is going to the SB, sometimes it's because of the file rating "unknown". But sometimes it's caused by the options of the HIPS (hips off, but I know some options are still operating: command line analysis, embedded code detection...). It's sad that the log is not saying why. (maybe it's a noob remark, sorry)
regards,
Last edited: