Automated Malware Analysis Report for 9O4ec239o8

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for 9O4ec239o8 ID: 317259 Sample Name: 9o4ec239o8 Cookbook: default.jbs Time: 14:41:35 Date: 15/11/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report 9o4ec239o8 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Memory Dumps 4 Sigma Overview 4 Signature Overview 5 AV Detection: 5 E-Banking Fraud: 5 Hooking and other Techniques for Hiding and Protection: 5 Malware Analysis System Evasion: 5 HIPS / PFW / Operating System Protection Evasion: 5 Stealing of Sensitive Information: 5 Remote Access Functionality: 5 Mitre Att&ck Matrix 5 Behavior Graph 6 Screenshots 7 Thumbnails 7 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 9 Domains and IPs 9 Contacted Domains 9 URLs from Memory and Binaries 9 Contacted IPs 9 Public 9 Private 10 General Information 10 Simulations 10 Behavior and APIs 10 Joe Sandbox View / Context 11 IPs 11 Domains 11 ASN 11 JA3 Fingerprints 11 Dropped Files 11 Created / dropped Files 11 Static File Info 13 General 13 File Icon 13 Static PE Info 13 General 13 Entrypoint Preview 13 Data Directories 14 Sections 15 Resources 15 Imports 16 Copyright null 2020 Page 2 of 23 Possible Origin 16 Network Behavior 16 TCP Packets 16 Code Manipulations 17 Statistics 17 Behavior 17 System Behavior 17 Analysis Process: 9o4ec239o8.exe PID: 2964 Parent PID: 5792 17 General 17 File Activities 18 File Created 18 File Deleted 18 File Written 18 Registry Activities 19 Key Value Created 19 Analysis Process: IKOa.exe PID: 5332 Parent PID: 2964 19 General 19 File Activities 19 File Read 19 Analysis Process: RegSvcs.exe PID: 5916 Parent PID: 5332 20 General 20 File Activities 20 File Created 20 File Written 20 File Read 21 Registry Activities 22 Key Created 22 Key Value Created 22 Analysis Process: rundll32.exe PID: 1460 Parent PID: 3472 22 General 22 Disassembly 23 Code Analysis 23 Copyright null 2020 Page 3 of 23 Analysis Report 9o4ec239o8 Overview General Information Detection Signatures Classification Sample 9o4ec239o8 (renamed file Name: extension from none to Muullltttiii AAVV SSccaannnneerrr ddeettteecctttiiioonn fffoorrr ssuubbm… exe) YMYaaurrrlatai dAdeeVttte eScccttteaednd n IIImerm diiiennteennctttion for subm Analysis ID: 317259 AYAllallllooracca adttteestse mcteemd oIomrrryym iiininn feffoonrrrteeiiiggnn pprrroocceessss… MD5: dc094df610899b1… HAHiliidldoeecssa tttehhsaa tttm ttthheeem ssoaarmy ippnlll eefo hhraeasisg bnbe epeernon c ddeooswws… Ransomware SHA1: ac9a225b8cff0a0… Miner Spreading IIHInnijjjdeeecctsttss t aha a PPt EEth ffefiiill lees a iiinnmtttoop laea ffhfooarrresei iigbgnen e ppnrrro odccoeew… SHA256: 3a26e36f25e5f3b… IInnjjeeccttss aa PPEE ffiillee iinnttoo aa ffoorreeiiggnn pprrooccee… mmaallliiiccciiioouusss malicious MInajaeccchhtisinn eae LPLeEeaa frrinlneiin nigng t dode eatte efcoctrtiieooinng nffoo prr r ssoaacmepp Evader Phishing Tags: ImminentRAT Maacchhiiinnee LLeeaarrrnniiinngg ddeettteecctttiiioonn fffoorrr ssaampp… sssuusssppiiiccciiioouusss suspicious Most interesting Screenshot: cccllleeaann TMTrrraiiieecssh tittnooe dd Leeettteeaccrttnt sisnaagnn ddbebotoexxceetsiso anan nfdod r o osttthahemerrr…p clean Exploiter Banker WTrrrireiiitttese sst o ttto od feffootrerreeciiitgg snna mndeebmoooxrreryys rr reaegngidiioo nonstsher Imminent Writes to foreign memory regions AWAnnrttititiiveviiisrrru utsos ooforrr r Meiagacnchh miiinneem LLoeeraayrrr nnreiiinngggio ddneesttteecc… Spyware Trojan / Bot Adware Score: 80 CAConontnivtttaairiiiunnss offfuurn nMcctattiiioconhnaianllliieittty yL fffeooarrr r rrrneeianadgd ddaeatttaea c fff… Range: 0 - 100 CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy ttftoo r b brllleooacckdk mdaootuaus sf… Whitelisted: false CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo cbchlhoeeccckkk m iiifff o aau dsd… Confidence: 100% CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo cchheecckk iiifff aa dd… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo cchheecckk iiifff aa wdw… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ccohomecmk uuifnn aiiicc awa… Startup CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo dcdyoynmnaammuiiicncaaiclllllalyy… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo edexyxenecacumuttteiec paprlrrloyo… System is w10x64 CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo llelaaxuuenncccuhht e aa p pprrror… 9o4ec239o8.exe (PID: 2964 cmdline: 'C:\Users\user\Desktop\9o4ec239o8.exe' MD5: DC094DF610899B15AC114FD2D5B2D067) IKOa.exe (PID: 5332 cmdline: C:\Users\user\AppData\Local\Temp\IXP000.TMP\IKOa.CeCxooenn tCttaaYiiinnfshs C fffuu nMnccDtttiiio5on:n aBalll0iiittt6yy E tttoo6 7lllaaFuu9nn7cc6hh7 aEa 5pp0rrr…23892D9698703AD098) RegSvcs.exe (PID: 5916 cmdline: 0 MD5: 2867A3817C9245F7CF518524DFD18F28) CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo oloappueennnc haa app ooprrrrttt… rundll32.exe (PID: 1460 cmdline: 'C:\Windows\system32\rundll32.exe' C:\Windows\system32\advpack.dll,DelNodeRunDLL32 'C:\Users\user\AppData\Local\Temp\IXP000.TMP\' MD5: 73C519F050C20580F8A62C849D49215A) CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo qoqupueerrnryy a CC pPPoUUrt … cleanup CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrqreeuaaeddr y ttth hCeeP ccUllliii… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrreettatrrridiiee vtvheee ii inncfflfoio… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo srsehhtuurittteddvooeww inn f///o … Malware Configuration CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ssiihimuutudlllaaotttwee n kk e/e … CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ssiiimuulllaatttee mke… Contains functionality to simulate m No configs have been found CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy wtwohh siiiccimhh umlaaatyey bbmee… CCoonntttaaiiinnss llflouonngcg t sisollleneeaeplpistsy ( ((w>>=h= i 3c3h m miiinna)))y be CCrroreenaattatteeinss s aa l oppnrrrogoc cseelsesses piiinns ss(u>us=sp p3ee nmnddiened)d moo… DCDereettteaectcettteesd da p ppoortttoeecnnetttiisiaaslll cicnrrry yspputttoso p fffueunncdcttetiiiodon nmo Yara Overview DDrrerootpeppcpteedd fffpiiillleoe t seseneeteinan l i iincn r cycopontnonn efeuccntttiiciootnino wnwiiittthh… DDrrrooppsps e PPdEE f ifflfiieilllee sseen in connection with Memory Dumps EDEnrnoaapbbslllee Pss E dd eefiblbeuusgg pprrriiivviiillleeggeess Source Rule DescriptionEExnxttateebnnlsesiisivvA eedu euutbshsueoeg roo pfff rGiveeilttetPPgrrreoosccAAddddSrrrteersisnss g (((oso… 00000002.00000002.503196069.0000000002EF1000.00000 JoeSecurity_Imminent Yara detected Joe Security FEFoxoutuennndds aiav ehh iiiuggshhe nn ouufm GbbeeetrrPr oorofff cWAiiidnnddrooewws s /// U(Uoss… 004.00000001.sdmp Imminent FFoouunndd aa hhiigghh nnuumbbeerr ooff Wiinnddooww // UUss… Process Memory Space: RegSvcs.exe PID: 5916 JoeSecurity_Imminent Yara detecteFdFo ouunndd papJo ohottteiegn nhSttti iieanacllul usmstrttrrirbtiiinyneggr oddfee Wccrrryiynppdtttiioioownn /// aUa…s Imminent OFoSSu vnvederr rspsiioiotnne ntttooti a ssltt trrsriiintnrgign mg adapeppcpiriinyngpg t ffifoounun n/d da … POPEES fffviiillleer cscoionnttt aatoiiinn ss t arainn g iiin nmvvaallpliiiddp iccnhhgee fccokkussnuudm PPEE fffiiilllee ccoonntttaaiiinnss eaexnxe eicncuvutattaalbibdllle ec hrrreesscookusurrurccmee… Sigma Overview PPEE fffiiilllee ccoonntttaaiiinnss sesttxtrrraeancnuggteea brrreeless ooreuusrrrcoceeussrce PPoEottt eefinlnettti iiacaloll knkeetayyi nllloosgg sggterearrr n ddgeeettte erccetttseeoddu (((rkkceeyys ss… No Sigma rule has matched QPouuteerrrniiieetissa lttt hhkee y vv oloolllugumgeeer iiidnnefffooterrrmctaeattdtiiioo (nnk e(((nyna asm… SQSaaumerppielllees eethxxee ccvuuotttliiiuoomnn esst ttoionppfoss r wmwhhaiiitllleieo npp rrr(oonccaeem… Sample execution stops while proce Copyright null 2020 Page 4 of 23 Signature Overview • AV Detection • Cryptography • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • E-Banking Fraud • System Summary • Data Obfuscation • Persistence and Installation Behavior • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Stealing of Sensitive Information • Remote Access Functionality Click to jump to signature section AV Detection: Multi AV Scanner detection for submitted file Yara detected Imminent Machine Learning detection for sample E-Banking Fraud: Yara detected Imminent Hooking and other Techniques for Hiding and Protection: Hides that the sample has been downloaded from the Internet (zone.identifier) Malware Analysis System Evasion: Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) HIPS / PFW / Operating System Protection Evasion: Allocates memory in foreign processes Injects a PE file into a foreign processes Writes to foreign memory regions Stealing of Sensitive Information: Yara detected Imminent Remote Access Functionality: Yara detected Imminent Mitre Att&ck Matrix Copyright null 2020 Page 5 of 23 Privilege Credential Lateral Command Initial Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Valid Native Application Exploitation for Disable or Modify Input System Time Remote Archive Exfiltration Over Other Ingress Tool Accounts 2 API 1 Shimming 1 Privilege Tools 1 1 Capture 2 1 Discovery 2 Services
Recommended publications
  • Scala Infochannel Player Setup Guide
    SETUP GUIDE P/N: D40E04-01 Copyright © 1993-2002 Scala, Inc. All rights reserved. No part of this publication, nor any parts of this package, may be copied or distributed, transmitted, transcribed, recorded, photocopied, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, manual, or otherwise, or disclosed to third parties without the prior written permission of Scala Incorporated. TRADEMARKS Scala, the exclamation point logo, and InfoChannel are registered trademarks of Scala, Inc. All other trademarks or registered trademarks are the sole property of their respective companies. The following are trademarks or registered trademarks of the companies listed, in the United States and other countries: Microsoft, MS-DOS, Windows, Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, DirectX, DirectDraw, DirectSound, ActiveX, ActiveMovie, Internet Explorer, Outlook Express: Microsoft Corporation IBM, IBM-PC: International Business Machines Corporation Intel, Pentium, Indeo: Intel Corporation Adobe, the Adobe logo, Adobe Type Manager, Acrobat, ATM, PostScript: Adobe Systems Incorporated TrueType, QuickTime, Macintosh: Apple Computer, Incorporated Agfa: Agfa-Gevaert AG, Agfa Division, Bayer Corporation “Segoe” is a trademark of Agfa Monotype Corporation. “Flash” and “Folio” are trademarks of Bauer Types S.A. Some parts are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. JPEG file handling is based in part on the work of the Independent JPEG Group. Lexsaurus Speller Technology Copyright © 1992, 1997 by Lexsaurus Software Inc. All rights reserved. TIFF-LZW and/or GIF-LZW: Licensed under Unisys Corporation US Patent No. 4,558,302; End-User use restricted to use on only a single personal computer or workstation which is not used as a server.
    [Show full text]
  • IBM Intelligent Video Analytics: VMS Extension for Cisco VSM 7
    IBM Intelligent Video Analytics Version 1.6.0.0 VMS extension for Cisco VSM 7 Installation and integration enablement guide IBM Intelligent Video Analytics Version 1.6.0.0 VMS extension for Cisco VSM 7 Installation and integration enablement guide Note Before using this information and the product it supports, read the information in “Notices, copyright, terms, and trademarks” on page 13. Contents Integrating IBM Intelligent Video Running the Findcameras.exe tool......10 Analytics with Cisco VSM 7 ......1 Running the SampleGrabber tool ......11 CiscoCamDiscovery.html Files required for the integration........1 Running the tool . 11 GraphEdit Installation overview ...........2 Running to troubleshoot issues . 12 Prerequisite steps .............2 MILS client preparation configuration .....3 Notices, copyright, terms, and Installing the Cisco VSM 7 DirectShow Filter on the trademarks .............13 SSE server ...............4 Notices ................13 Installing the Cisco VSM 7 VMS extension on MILS . 6 Copyright notice.............15 Installing and registering the Cisco VSM 7 web Additional notices ............15 components..............6 Trademarks ..............15 Configuring the VMS server, cameras, and channels ...............8 Troubleshooting issues with the Cisco sample application and test tools ..........10 © Copyright IBM Corp. 2015 iii iv IBM Intelligent Video Analytics: VMS extension for Cisco VSM 7 Installation and integration enablement guide Integrating IBM Intelligent Video Analytics with Cisco VSM 7 IBM® Intelligent Video Analytics (IBM IVA) version V1.6 can be integrated with Cisco Video Surveillance Manager (VSM) version 7. The IBM IVA V1.6 VMS extension package for Cisco VSM 7.5 (IVA-Cisco-VSM7_Integration.zip) and the downloadable prerequisite open source files provide a complete set of instructions and media for installing and configuring the integration.
    [Show full text]
  • [MS-GPPREF]: Group Policy: Preferences Extension Data
    [MS-GPPREF]: Group Policy: Preferences Extension Data Structure Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation (“this documentation”) for protocols, file formats, data portability, computer languages, and standards support. Additionally, overview documents cover inter-protocol relationships and interactions. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you can make copies of it in order to develop implementations of the technologies that are described in this documentation and can distribute portions of it in your implementations that use these technologies or in your documentation as necessary to properly document the implementation. You can also distribute in your implementation, with or without modification, any schemas, IDLs, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications documentation. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that might cover your implementations of the technologies described in the Open Specifications documentation. Neither this notice nor Microsoft's delivery of this documentation grants any licenses under those patents or any other Microsoft patents. However, a given Open Specifications document might be covered by the Microsoft Open Specifications Promise or the Microsoft Community Promise. If you would prefer a written license, or if the technologies described in this documentation are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • Chapter 25 Directshow Capture
    Chapter 25 I DirectShow Capture Why Read As we were writing the book, DirectShow was still in its beta cycle. Nonetheless, we de- This Chapter? cided to add a new chapter to cover some of the new features of DirectShow, namely the new capture and compression interfaces. In this chapter, you’ll ■ get an overview of capture under VFW and DirectShow; ■ understand the internal workings of the sample video capture filter, which wraps any VFW driver; and ■ learn how to access the new capture interfaces from your application. 25.1 Overview of DirectShow Capture As of the time of the publication of this book, all video capture adapters use the Video for Windows (VFW) interface to implement capture drivers under Windows. VFW was designed to handle linear video capture and compression but did not handle video/audio synchronization, MPEG-style video, TV tuning, or video conferencing. As a result, Microsoft developed ActiveMovie 1.0 to address some of these issues. ActiveMovie 1.0 provided audio and video playback, synchronization between multiple streams, and MPEG1 support. But ActiveMovie 1.0 lacked support for audio/video cap- ture, TV tuning, and compression. ■—25-1—■ 25-2—■ —Chapter 25 DirectShow Capture DirectShow 2.0 completes the puzzle and provides the missing pieces of ActiveMovie 1.0. DirectShow defines the necessary interface to build a cap- ture source filter and the necessary means of accessing such interfaces from within an application. To provide a migration path, Microsoft imple- mented a default capture filter, which acts as a wrapper for any existing VFW video capture filter.
    [Show full text]
  • Axis Camera Station User Manual
    AXIS Camera Station User Manual About This Document This manual is intended for administrators and users of AXIS Camera Station, and is applicable for software release 5.0 and later. It covers configuration of AXIS Camera Station Server and AXIS Camera Station Client as well as instructions for using and managing AXIS Camera Station on your network. The latest version of this document will be available on www.axis.com. See also the product’s help pages. Intellectual Property Rights Axis AB has intellectual property rights relating to technology embodied in the product described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the patents listed at www.axis.com/patent.htm and one or more additional patents or pending patent applications in the US and other countries. Legal Considerations Video and audio surveillance can be regulated by laws that vary from country to country. Check the laws in your local region before using this product for surveillance purposes. Liability Every care has been taken in the preparation of this document. Please inform your local Axis office of any inaccuracies or omissions. Axis Communications AB cannot be held responsible for any technical or typographical errors and reserves the right to make changes to the product and manuals without prior notice. Axis Communications AB makes no warranty of any kind with regard to the material contained within this document, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Axis Communications AB shall not be liable nor responsible for incidental or consequential damages in connection with the furnishing, performance or use of this material.
    [Show full text]
  • WSAP 01706 Incoming Me,Sage Fwd: Microsoft Multimedia Delays Page 2 of 4
    ~ncom~ng Message Fwd: Microsoft Multimej;lia Delays Page I of 4 $~Jb~ecL Fwd: Microsoft Multimedia Delays Sent 1/24/97 5:27 PM F~eceived: 1/24/97 11:50 AM From: Mitchell Weinstock, [email protected] "o Charles Wiltgen, [email protected] M~tcinell Weinsto¢l£ schlepperOapple.com ,John Harnman, [email protected] Ralph Rogers, rogers.r@epplecom Carlos Montalvo,, [email protected] Tim Schaaff, [email protected] Peter Hod(lie, [email protected] j~m Batson~ [email protected] John COOK, [email protected] Greg Chapman, [email protected] Ke~th Gurganus, [email protected] Jonn Altano, alfanol @apple.corn BranOee Allen, [email protected] Jennifer Blome, ienniler@==pple.com Mananne Manno, MMARINO@app~e.com Param Smgh. [email protected] L~sa Payne. [email protected] Andrew Salop, SALOP A@apple corn I’,amy Stevens. Kamys@apple corn Gu~erimo Ort=z. [email protected] Shawn Ho~wood. s.hopwoo@appte corn Clent RlcharOson. [email protected] ~ act FwC~ M~crosofl Mull=media Delays .~e’! 1/24/97 11 04 AM qe:e~veC~ 1/24/97 10 18 AM =rein Fiona Lee, [email protected] -e Apl Mdchell Wemstoc~., [email protected] ~uDlecl M~crosofl Mull,media Delays Bert: 1/23/97 2:43 PM qe::~mvecl 1/23/97 6 06 PM r-tom: Richard "Doherl"y. [email protected] "o Fiona "Leer flee@apple corn To Competitive Analysis Team =rein: R,chard Doherly, The Enwsioneer~ng Group S,J~iect Microsofl Delays Multimedia Day Yet Again; Developers Heeding ~nlel Value Messages Tr~e S~lualion: M~c,osofl has postponed ils key Fall/Winter Multimedia Developer event - "ecently slated for next Tuesday in Redmond - for the third t~me ~n as many montr’s M~:rosott n=hally set November 29th as their Judgment Day II (Ju~Jgment was tr~e release of Achve X) for IHVs, ISVs anci conlent publishers It ~er~amed A WSAP 01706 Incoming Me,sage Fwd: Microsoft Multimedia Delays Page 2 of 4 ActiveX day, it had been changed to January 28th in Redmond, WA.
    [Show full text]
  • Multimedia Platforms
    Multimedia Platforms Multimedia Computer Block Diagram Windows MCI (Multimedia Control Interface) Video for Windows & MCI Quicktime DirectX ActiveMovie ActiveMovie Architecture ActiveMovie Filters ActiveMovie Dynamic Rate Control DirectShow http://msdn.microsoft.com/library/en- us/dnanchor/html/graphicsmultimedia.asp DirectShow System Overview Working with multimedia presents several major challenges: Multimedia streams contain large amounts of data, which must be processed very quickly. Audio and video must be synchronized so that it starts and stops at the same time, and plays at the same rate. Data can come from many sources, including local files, computer networks, television broadcasts, and video cameras. Data comes in a variety of formats, such as Audio-Video Interleaved (AVI), Advanced Streaming Format (ASF), Motion Picture Experts Group (MPEG), and Digital Video (DV). The programmer does not know in advance what hardware devices will be present on the end-user's system. DirectShow System Overview DirectShow is designed to address each of these challenges. Its main design goal is to simplify the task of creating digital media applications on the Windows® platform, by isolating applications from the complexities of data transports, hardware differences, and synchronization. DirectShow Components DirectShow Filters DirectShow uses a modular architecture, where each stage of processing is done by a COM object called a filter. DirectShow provides a set of standard filters for applications to use, and developers can write their own custom filters that extend the functionality of DirectShow. To play an AVI video file: Read the raw data from the file as a byte stream (File Source filter). Examine the AVI headers, and parse the byte stream into separate video frames and audio samples (AVI Splitter filter).
    [Show full text]
  • Virus Bulletin, July 2000
    ISSN 0956-9979 JULY 2000 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Francesca Thorneloe CONTENTS Technical Consultant: Fraser Howard Technical Editor: Jakub Kaminski COMMENT Viruses are not Speech 2 Consulting Editors: VIRUS PREVALENCE TABLE 3 Nick FitzGerald, Independent consultant, NZ Ian Whalley, IBM Research, USA NEWS Richard Ford, Independent consultant, USA 1. Hard Cell 3 Edward Wilding, Maxima Group Plc, UK 2. Neo-NATO Viruses 3 3. Hello and Goodbye 3 LETTERS 4 IN THIS ISSUE: VIRUS ANALYSIS • VBS-pecially for you: Marius van Oers’ Technical Smash and Burn 6 Analysis on p.8 covers the hot topic of VBScripting in the wake of disruption caused by VBS/LoveLetter and JS/Kak. TECHNICAL ANALYSIS • Totally topical: Eric Chien prefaces his upcoming Following the Script 8 VB2000 paper on the malicious threats that face Palm BOOK REVIEW Personal Digital Assistants, on p.12. Bookworms – and Viruses 10 • Win-dows some, lose some: 18 products, the OPINION occasional new entry amid some familiar faces, were submitted to this month’s Comparative What the Headlines Don’t Say … 11 Review for Windows 98, which starts on p.16. FEATURE Palm Breach 12 TUTORIAL Safe Hex in the 21st Century: Part 2 14 COMPARATIVE REVIEW In it to Win 98 it! 16 END NOTES AND NEWS 24 VIRUS BULLETIN ©2000 Virus Bulletin Ltd, The Pentagon, Abingdon, Oxfordshire, OX14 3YP, England. www.virusbtn.com /2000/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • CISC 3630 [52] Multimedia Computing 3 Hours 3 Credits
    Brooklyn College Department of Computer and Information Science CISC 3630 [52] Multimedia Computing 3 hours 3 credits Surveys the interrelationship of state-of-the-art communication, and computer technology. Hardware, software and system design issues in the multimedia presentation of information. Multimedia standards. Audio and video compression techniques. Hypermedia database systems. Programming and the use of multimedia authoring systems. Survey of representative hypermedia applications. Textbooks Multimedia: Making it Work, 7th edition, Tay Vaughn, McGraw Hill, 2006 Johnson, Steven M, Macromedia Director 8 Shockwave Studio (Complete), Course Technology, 2001. Required Projects PowerPoint Project HTML Project Director Project Portfolio Syllabus I. Introduction A. Uses of multimedia information B. Historical background II. Survey of hardware A. Graphic boards and accelerators B. Sound boards C. Video capture boards D. Magnetic and optical storage devices E. DVD (macrovision, VOBs, ripping techniques) III. Survey of software A. Graphic standards B. Music computer formats C. Video computer standards D. Gaming E. Authoring Systems IV. Multimedia Platforms (QuickTime, MCI, Video for Windows, Activemovie, Direct-X) V. Multimedia Programming (Java, Active-X, MCI, Windows Foundation Classes) VI. The creative process: hardware, software, development team and methodology VII. Media Types – Media Objects (Implementations and methods) A. Text 1. Encoding – ASCII, Unicode 2. Formatting – in-line (.dot notation, HTML, SGML) 3. Page description languages – Adobe pdf B. Image 1. bit mapped vs. vector based representations 2. Color Space Representations – RGB, CMY, HSU 3. CLUTs 4. color depth and resolution 5. Image File Formats BMP, GIF, JPEG, PNG, TIFF 6. Editing tools and effects (pixel methods, masking, morphing, etc.) C. Graphics – Internal and external modeling techniques, mapping, lighting, viewing and rendering D.
    [Show full text]
  • 193 B. Microsoft's Proposal of Market-Division Agreements To
    B. Microsoft’s proposal of market-division agreements to eliminate other potentially threatening middleware confirms the anticompetitive character of its course of conduct against the browser 1. Microsoft similarly attempted to divide markets with Apple 73. Microsoft made other efforts to divide markets with platform-level competitors. Those efforts establish a pattern and practice of attempts to eliminate competition by agreement with rivals. 74. Microsoft sought to divide markets with Apple for the purpose of eliminating competing platform-level technology. a. Apple’s QuickTime multimedia software, like the browser, is platform-level software that Microsoft viewed as a potential threat to its operating system monopoly 75. Apple Computer’s QuickTime is its software architecture for the creation, editing, publishing, and playback of multimedia content (e.g., audio, video, graphics, and 3D) on the Macintosh and Windows operating systems. QuickTime is cross-platform; developers using QuickTime technology can create multimedia content that will run on QuickTime implementations for both Windows and Macintosh. i. Tevanian Dir. ¶¶ 47, 50-51, 54, 57-59, 67-68; Tevanian, 11/5/99am, at 27:1-7; 11/4/99am, at 45:3 - 46:6 (testifying concerning QuickTime’s API and cross platform capabilities). 76. Apple, through QuickTime, competes against Microsoft, among other firms, in providing multimedia functionality to Windows users. i. Tevanian testified that QuickTime competes with Microsoft’s multimedia technologies, including Microsoft’s multimedia APIs (DirectX) and media player (Windows Media Player). Tevanian Dir. ¶¶ 69-70. See generally Tevanian ¶¶ 57, 60-65. ii. Eric Engstrom, Microsoft’s former general manager for multimedia, acknowledged that 193 Apple competes to varying degrees with Microsoft in trying to convince developers to target their respective multimedia APIs, codecs and file formats suitable for their respective players.
    [Show full text]
  • Directx 9 User Interfaces: Design and Implementation
    DirectX® 9 User Interfaces: Design and Implementation Alan Thorn This page intentionally left blank. DirectX® 9 User Interfaces: Design and Implementation Alan Thorn Wordware Publishing, Inc. Library of Congress Cataloging-in-Publication Data Thorn, Alan. DirectX 9 user interfaces : design and implementation / by Alan Thorn. p. cm. ISBN 1-55622-249-1 (pbk.) 1. User interfaces (Computer systems). 2. DirectX. I. Title. QA76.9.U83T53 2004 005.4'38—dc22 2003025230 CIP © 2004, Wordware Publishing, Inc. All Rights Reserved 2320 Los Rios Boulevard Plano, Texas 75074 No part of this book may be reproduced in any form or by any means without permission in writing from Wordware Publishing, Inc. Printed in the United States of America ISBN 1-55622-249-1 10987654321 0401 DirectX is a registered trademark of Microsoft Corporation in the United States and/or other countries. Microsoft DirectX 9.0 SDK Update (Summer 2003) copyright Microsoft Corporation, 2002. All rights reserved. All brand names and product names mentioned in this book are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of service marks or trademarks should not be regarded as intent to infringe on the property of others. The publisher recognizes and respects all marks used by companies, manufacturers, and developers as a means to distinguish their products. This book is sold as is, without warranty of any kind, either express or implied, respecting the contents of this book and any disks or programs that may accompany it, including but not limited to implied warranties for the book’s quality, performance, merchantability, or fitness for any particular purpose.
    [Show full text]
  • Configuring Infochannel Network Manager 50 Configuring an Infochannel Player Machine 61 Dial-Up FTP Access Configuration 71 Miscellaneous Player Issues 80
    Copyright © 1993-2002 Scala, Inc. All rights reserved. No part of this publication, nor any parts of this package, may be copied or distributed, transmitted, transcribed, recorded, photocopied, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, manual, or otherwise, or disclosed to third parties without the prior written permission of Scala Incorporated. TRADEMARKS Scala, the exclamation point logo, and InfoChannel are registered trademarks of Scala, Inc. All other trademarks or registered trademarks are the sole property of their respective companies. The following are trademarks or registered trademarks of the companies listed, in the United States and/or other countries: Microsoft, MS-DOS, Windows, Windows NT, DirectX, DirectDraw, DirectSound, ActiveX, ActiveMovie, Outlook, Verdana, JScript: Microsoft Corporation Pentium, Intel. Indeo: Intel Corporation Adobe, the Adobe logo, Adobe Type Manager, Acrobat, ATM, PostScript: Adobe Systems Incorporated UNIX: The Open Group Some parts are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. WARRANTIES AND DISCLAIMERS The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local Law: SCALA INCORPORATED PROVIDES THIS PUBLICATION “AS IS” WITHOUT ANY WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE LIMITED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer or express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication.
    [Show full text]