Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 401458 Sample Name: 25aabd25_by_Libranalysis.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 17:06:17 Date: 30/04/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Analysis Report 25aabd25_by_Libranalysis.docm 5 Overview 5 General Information 5 Detection 5 Signatures 5 Classification 5 Startup 5 Malware Configuration 5 Yara Overview 5 Sigma Overview 5 System Summary: 5 Signature Overview 5 AV Detection: 6 Software Vulnerabilities: 6 System Summary: 6 Data Obfuscation: 6 Mitre Att&ck Matrix 6 Behavior Graph 7 Screenshots 7 Thumbnails 7 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 8 Domains and IPs 10 Contacted Domains 10 Contacted URLs 10 URLs from Memory and Binaries 10 Contacted IPs 13 Public 14 Private 14 General Information 14 Simulations 15 Behavior and APIs 16 Joe Sandbox View / Context 16 IPs 16 Domains 16 ASN 16 JA3 Fingerprints 16 Dropped Files 16 Created / dropped Files 17 Static File Info 20 General 20 File Icon 20 Static OLE Info 21 General 21 OLE File "/opt/package/joesandbox/database/analysis/401458/sample/25aabd25_by_Libranalysis.docm" 21 Indicators 21 Summary 21 Document Summary 21 Streams with VBA 21 VBA File Name: ThisDocument.cls, Stream Size: 1307 21 General 21 VBA Code Keywords 22 Copyright Joe Security LLC 2021 Page 2 of 49 VBA Code 22 VBA File Name: arrayCopy.cls, Stream Size: 1490 22 General 22 VBA Code Keywords 22 VBA Code 23 VBA File Name: bufferTmpRequest.bas, Stream Size: 2002 23 General 23 VBA Code Keywords 23 VBA Code 23 VBA File Name: frm.frm, Stream Size: 1661 23 General 23 VBA Code Keywords 23 VBA Code 24 VBA File Name: indexPasteConvert.bas, Stream Size: 8002 24 General 24 VBA Code Keywords 24 VBA Code 26 Streams 26 Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 627 26 General 26 Stream Path: PROJECTwm, File Type: data, Stream Size: 188 26 General 26 Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 4406 26 General 26 Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 2428 26 General 26 Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 206 27 General 27 Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 532 27 General 27 Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 156 27 General 27 Stream Path: VBA/dir, File Type: SVR2 executable (Amdahl-UTS) not stripped - version 8520192, Stream Size: 1117 27 General 27 Stream Path: frm/\x1CompObj, File Type: data, Stream Size: 97 28 General 28 Stream Path: frm/\x3VBFrame, File Type: ASCII text, with CRLF line terminators, Stream Size: 286 28 General 28 Stream Path: frm/f, File Type: data, Stream Size: 90 28 General 28 Stream Path: frm/o, File Type: data, Stream Size: 44 28 General 28 Network Behavior 29 Network Port Distribution 29 TCP Packets 29 UDP Packets 29 DNS Queries 31 DNS Answers 31 HTTP Request Dependency Graph 31 HTTP Packets 31 Code Manipulations 31 Statistics 31 Behavior 31 System Behavior 32 Analysis Process: WINWORD.EXE PID: 6116 Parent PID: 792 32 General 32 File Activities 32 File Created 32 File Deleted 33 File Written 33 File Read 41 Registry Activities 41 Key Created 41 Key Value Created 42 Key Value Modified 45 Analysis Process: explorer.exe PID: 6048 Parent PID: 6116 47 General 47 File Activities 47 File Created 47 Analysis Process: explorer.exe PID: 5316 Parent PID: 792 47 General 47 Registry Activities 47 Analysis Process: mshta.exe PID: 4804 Parent PID: 5316 48 General 48 File Activities 48 File Deleted 48 Registry Activities 48 Analysis Process: regsvr32.exe PID: 4864 Parent PID: 4804 48 General 48 Copyright Joe Security LLC 2021 Page 3 of 49 File Activities 49 File Read 49 Disassembly 49 Code Analysis 49 Copyright Joe Security LLC 2021 Page 4 of 49 Analysis Report 25aabd25_by_Libranalysis.docm Overview General Information Detection Signatures Classification Sample 25aabd25_by_Libranalysis Name: .docm Muullltttiii AAVV SSccaannnneerrr ddeettteecctttiiioonn fffoorrr ssuubbm… Analysis ID: 401458 OMffuffffiilictcie eA ddVoo cScuucmaneennettt rttt rrrdiiieesst e tttocot iccooonnn fvvoiiinrn csceue b vvmiii… MD5: 25aabd2540a1f7b… SOSiiifggfimceaa d ddoeecttteuecmcttteednd::t: RtRreieggsiii ssttottee rcrr oDDnLLvLLin wwceiiittth hv iss… SHA1: 85f6b809a81a361… DSDoiogccmuuma edenenttt e cccootnentdttaa:i iinRnsse aganins teemr DbbeLedLdd dweedidth VV sBB… Ransomware SHA256: efb29655c57e8dc… Miner Spreading DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… Infos: mmaallliiiccciiioouusss DDooccuumeennttt ecexoxpnplltloaoiiittnt dsde eatttenec cetttemeddb ((e(ppdrrrodocecedes sVss…B malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious Document exploit detected (process MDoaaccuhhmiiinnee n LLte eeaaxrrrpnnliioinnigtg d ddeeettteteeccctttetiiioodnn ( pfffoorrorr csseaasmspp… cccllleeaann Most interesting Screenshot: clean CMCooannctthtaaiiininness Lcceaaappraanbbiniiillliigitttii ieedsse ttteooc ddtieoettntee cfcottt rvv isiirrratttuumaap… Exploiter Banker CCrroreenaattatteeinss s aa c pparrrpooaccbeeislsistsi e iiinsn stsouu sdsppeeetenncddte evddi r mtuoao… Spyware Trojan / Bot DCDoroeccauutmesee nantt t p ccroonncttteaasiiinnss si n aa nsn u eesmpbebenedddededed dm VVoBB… Adware Score: 80 Range: 0 - 100 DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… Whitelisted: false DDooccuumeennttt ccoonntttaaiiinnss eaemn bebemeddbddeeedddd VeVdBB AVA B … Confidence: 100% DDooccuumeennttt ccoonntttaaiiinnss nenomo ObeLLdEEd sesttdtrrre eVaaBmA … DDooccuumeennttt hchaoasns t aaninn usu nnkkonn oOowwLnEn aasptprppelllaiiiccmaatt tiii… MDoocnnuiiitttmoorrressn ccte ehrrratttaasiii nna nrrree uggniiissktttnrrryyo wkkeenyy ass p /// p vvlaiaclllauut…i PMPootttneeinntotttiiiraaslll dcdeoorcctuaumine ernenttgt eiesxxtprpylllo okiiittet dydese ttt/ee vccattteeludd… Startup PPoottteenntttiiiaalll ddooccuumeennttt eexxpplllooiiittt ddeettteeccttteedd… PPoottteenntttiiiaalll ddooccuumeennttt eexxpplllooiiittt ddeettteeccttteedd… System is w10x64 WINWORD.EXE (PID: 6116 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\WINQPWouuteOerrrnRiiieetDissa . lttEt hhdXeeo E cvvu'o o/mllAluuemunteoet m eiiinnxafffpotoilrorromnit a a-dtEttieiioomtnenb c (((entnedaaddmin…g MD5: 0B9AB9B9C4DE429473D6450D4297A123) explorer.exe (PID: 6048 cmdline: explorer c:\users\public\valuePasteList.hta MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) SQSeeuaaerrrcciehhsee stsh fffeoo rrrv ttothhleue m Meiiic cirrnroofsosoromfffttt a Otiuouttntllloo (oonkka fmff… explorer.exe (PID: 5316 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D) mshta.exe (PID: 4804 cmdline: 'C:\Windows\SysWOW64\mshta.exe' 'C:\Users\Public\vTSTarreriliieuaesersc P ttthooae slllsoot eaafoLddri s mtth.iihisests saMiiin'n i{gcg1 r DEoDs4LLo6LLf0sst BODu7tl-oFo1kC f3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3- 4B2E-88BF-4E770A288AF5} MD5: 7083239CE743FDB68DFC933B7308E80A) Tries to load missing DLLs regsvr32.exe (PID: 4864 cmdline: 'C:\Windows\System32\regsvr32.exe' c:\users\pUuTUbrssileeicss\ vataoa k lklunoneoaoPwdwa nmns twiweseLsebiibns btgb.rj rrpDoogwLw LsMseseDrrr 5uu:ss 4ee2rrr 6aaEgge7e…499F6A7346F0410DEAD0805586B) cleanup UUsseess caco okddneeo owobbnfff uuwsseccbaa tttbiiioornon w ttteesccehhrn nuiiiqsqueuere sas g (((…e Uses code obfuscation techniques ( Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview System Summary: Sigma detected: Register DLL with spoofed extension Signature Overview Copyright Joe Security LLC 2021 Page 5 of 49 • AV Detection • Compliance • Software Vulnerabilities • Networking • System Summary • Data Obfuscation • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section AV Detection: Multi AV Scanner detection for submitted file Machine Learning detection for sample Software Vulnerabilities: Document exploit detected (process start blacklist hit) System Summary: Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) Document contains an embedded VBA macro with suspicious strings Data Obfuscation: Document contains an embedded VBA with many string operations indicating source code obfuscation Mitre Att&ck Matrix Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Scripting 2 2 DLL Side- Process Masquerading 1 OS Query Registry 1 Remote Email Exfiltration Ingress Tool Eavesdrop on Accounts Loading 1 Injection 1 2 Credential Services Collection 1 Over Other Transfer 1 Insecure Dumping Network Network Medium Communication Default Exploitation for Boot or DLL Side- Disable or Modify LSASS Security Software Remote Data from Exfiltration Non- Exploit SS7 to Accounts Client Logon Loading 1 Tools 1 Memory Discovery 1 1 Desktop Removable Over Application Redirect Phone Execution 1 3 Initialization Protocol Media Bluetooth Layer Calls/SMS Scripts Protocol 2 Domain At (Linux) Logon Script Logon Script Virtualization/Sandbox Security Virtualization/Sandbox SMB/Windows Data from Automated Application Exploit SS7 to Accounts (Windows) (Windows) Evasion 1 Account Evasion 1 Admin Shares Network Exfiltration Layer Track Device Manager Shared Protocol 1 2 Location Drive Local At (Windows) Logon Script Logon Script
Recommended publications
  • Status and Projections of the NAS Program Frank R
    https://ntrs.nasa.gov/search.jsp?R=19870015491 2020-03-20T10:46:12+00:00Z View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NASA Technical Reports Server NASA Technical Memorandum 88339 . , Status and Projections of the NAS Program Frank R. Bailey EECGECTIOIS CP f Avail: NTlS P87-24924 CSCL 09B 63 Unclad 0080153 July 1986 National Aeronautics and Space Administration ~~ ~ NASA Technical Memorandum 88339 Status and Projections of the NAS Program Frank R. Bailey, Ames Research Center, Moffett Field, California July 1986 NASA National Aeronautics and Space Adminlstratlon Ames Research Center Moffett Field. California 94035 STATUS AND PROJECTIONS OF THE NAS PROGRAM by Dr. F. Ron Bailey to be presented at the SYMPOSIUM ON FUTURE DIRECTIONS OF COMPUTATIONAL MECHANICS ASME Winter Annual Meeting December 7-12, 1986 Anaheim, California ABSTRACT NASA's Numerical Aerodynamic Simulation (NASI Program has completed devel- opment of the initial operating configuration of the NAS Processing System Net- work (NPSN). This is the first milestone in the continuing and pathfinding effort to provide state-of-the-art supercomputing for aeronautics research and development. The NPSN, available to a nation-wide community of remote users, provides a uniform UNIX 1 environment over a network of host computers ranging from the new Cray-2 supercomputer to advanced scientific workstations. This system, coupled with a vendor-independent base of common user interface and network software, presents a new paradigm for supercomputing environments. Presented here is the background leading to the NAS Program, its programmatic goals and strategies, technical goals and objectives, and the development activ- ities leading to the current NPSN configuration.
    [Show full text]
  • Einführung in Z/OS Und OS/390
    Einführung in z/OS und OS/390 Dr. rer. nat. Paul Herrmannn Prof. Dr.-Ing. Wilhelm G. Spruth WS 2006/2007 Teil 3 z/OS Betriebssystem es 0101 ww6 wgs 09-99 System z und S/390 Betriebssysteme z/OS IBM große Installationen (OS/390, MVS) z/VSE IBM mittelgroße Installationen z/VM IBM Virtualisierung, Software Entwicklung TPF IBM spezialisierte Transaktionsverarbeitung UTS 4 Amdahl based on System V, Release 4 (SVR4) OSF/1 Hitachi Open System Foundation Unix z/Linux Public Domain Alle System z bzw. S/390 Betriebssysteme sind Server Betriebssysteme, optimiert für den Multi-User Betrieb es 0521z ww6 wgs 09-99 Transaction Processing Facility TPF 13. Oktober 2006. Die Firma Worldspan, ein weltweiter Anbieter von Reise-Reservierungs- systemen, hat sich für den Einsatz von sechs IBM System z9 Enterprise Class (EC) Mainframe-Servern entschieden. Worldspan will damit sein Angebot an elektronischen Datendiensten erweitern, um circa 700 Anbietern von Reiseangeboten und Millionen von Reisenden weltweit eine gemeinsame Plattform anbieten zu können. Worldspan setzt die neuen IBM System z9 EC Server ein, um sowohl Reisebüros als auch Anbietern von Online-basierten Reisediensten die Möglichkeit zur Nutzung des weltweiten Global Distribution System (GDS) zu geben, über das zum Beispiel die Bestellung und Buchung von Reiseprodukten von Flugzeugtickets, Hotels, Mietwagen und andere Reisedienstleistungen durchgeführt wird. Durch die Nutzung der Software „IBM Transaction Processing Facility“ (TPF) ist Worldspan in der Lage, 17.000 Kundenanfragen pro Sekunde auf
    [Show full text]
  • Joseph S. Mertz Jr. EDUCATION
    Jan 2020 Joseph S. Mertz Jr. H. John Heinz III College & Dietrich College of Humanities and Social Sciences Carnegie Mellon University Pittsburgh, PA 15213-3890 Phone: (412) 268-2540 Email: [email protected] EDUCATION: 1995 Carnegie Mellon University Ph.D. in Engineering and Public Policy 1983 University of Southern California M.S. in Computer Science 1982 Pennsylvania State University B.S. in Computer Science ACADEMIC APPOINTMENTS: Carnegie Mellon University 2018 – present: Director - Information Systems Program 2015 – present: Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2010 – 2015: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2005 – 2010: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College School of Computer Science Spring 2009: Associate Teaching Professor Carnegie Mellon Qatar Computer Science Spring 2008: Associate Teaching Professor Carnegie Mellon Qatar Computer Science 2002 – 2005: Associate Teaching Professor Joint 50/50 appointment: Mertz-CV H. John Heinz III School of Public Policy & Management School of Computer Science 1996 – 2002: Co-Director Center for University Outreach 1994 – 1996: Post Doctoral Fellow Center for Innovation in Learning 1988 – 1995: Graduate Research Assistant Department of Engineering & Public Policy University of Puerto Rico 1986 – 1987: Visiting Professor Department of Electrical & Computer Engineering Illinois Benedictine College 1984: Adjunct Instructor Computer Science AWARDS: Mark Gelfand Service Award for Educational Outreach – 2012 Annual University honor for sustained, effective community service with academic coursework to enhance learning, and teach social responsibility. Nominated for the Martcia Wade Teaching Award – 2012 H.
    [Show full text]
  • How Attackers Break Programs, and How to Write Programs More Securely
    How Attackers Break Programs, and How To Write Programs More Securely Matt Bishop Department of Computer Science University of California at Davis Davis, CA 95616-8562 United States of America email: [email protected] www: http://seclab.cs.ucdavis.edu/~bishop phone: +1 (530) 752-8060 © 2002 by Matt Bishop This page deliberately left blank. That is, this page would have been blank except that we had to put the notice "this page deliberately left blank" on it. Otherwise, you might have seen the blank page and worried that someone left a page out of your booklets. So, we put a note on the blank page to assure you that no-one forgot to put something on this page; indeed, we intended for it to be blank. But we could not live up to our intentions, for the reason stated above, so we couldn't put a blank page in here. We had to put a page with some writing on it. So we couldn't put the notice "this page deliberately left blank" because it's not true and, if we couldn't tell when a page is blank, you'd doubt the veracity of everything we did. So we wrote this paragraph to ... oh, heck, forget it. Table of Contents sections slides Overview..................................... 1— 13 Attacking Programs ........................... 14—123 Overview .......................14 — 20 Users and Privilege ...............21 — 29 Environment ....................30 — 48 Buffer Overflow ..................49 — 70 Numeric Overflow ................71 — 76 Validation and Verification .........77 — 92 Race Conditions..................93—112 Denial of Service ............... 113—121 Environment .................. 122—123 Writing Better Programs ......................124—379 Overview ....................
    [Show full text]
  • 17. Websphere Application Server
    17. WebSphere Application Server 17.1 z/OS as a Unix System 17.1.1 Unix Betriebssysteme Welche Server-Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series, OS/400 • zSeries Betriebssysteme – z/OS, z/VM, z/VSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix Unix Systeme sind weitestgehend, • MacOS (BSD) aber nicht 100 % kompatibel • Linux, einschließlich zLinux • z/OS Unix System Services Führende Unix Großrechner sind: • Integrity Superdome von HP mit Itanium Prozessoren und dem HP-UX Betriebssystem • M9000 bzw. SPARC M5-32 Server von Oracle mit Sparc Prozessoren und dem Solaris Betriebssystem. Ein verwandtes Produkt wird von der Firma Fujitsu unter dem Namen „SPARC Enterprise Server“ vertrieben. • System p von IBM mit PowerPC Prozessoren und dem AIX Betriebssystem Neben den proprietären Unix Dialekten ist auf diesen Rechnern auch Linux verfügbar. Performance Unix versus z/OS Die I/O Leistung eines Rechners wird gemessen in der Anzahl von I/O Operationen pro Sekunde unter realistischen Betriebsbedingungen. Konkrete Untersuchungen sind nie veröffentlicht worden, aber es wird allgemein angenommen, dass die z/OS I/O Leistung vielleicht um einen Faktor 3 - 10 höher als die I/O Leistung von großen Unix Rechnern wie Superdome und M9000 ist. 17-1 17.1.2 Was definiert ein Unix System ? Unix wurde ursprünglich von Ken Thompson und Dennis Ritchie an den Bell Telephone Laboratories für Rechner der Digital Equipment Corporation (DEC) entwickelt und 1971 erstmalig im praktischen Betrieb eingesetzt. Schon bald entstanden (fast) kompatible Implementierungen für andere Rechner. Aus Bemühungen um einen einheitlichen Unix Standard entstand die Portable Operating System Interface (POSIX).
    [Show full text]
  • Les Routeurs Multicast
    Raccorder son réseau d’entreprise à l’Internet Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu To cite this version: Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu. Raccorder son réseau d’entreprise à l’Internet. Editions Eyrolles, 1997, 9782212089516. hal-01649131 HAL Id: hal-01649131 https://hal.archives-ouvertes.fr/hal-01649131 Submitted on 3 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License Remerciements Nous tenons tout particulierement` a` remercier Philippe DAX, Nadine RICHARD et Ahmed SERHROUCHNI pour les precieux´ conseils qu’ils nous ont prodigues´ durant la redaction´ de cet ouvrage ainsi que pour leur patience lors des multiples relectures. Les noms d’utilisateurs fictifs presents´ dans les exemples de ce livre nous ont et´ e´ gracieu- sement pretˆ es´ par Luc BEURTON et Stoned ELIPOT, qui nous ont egalement´ aides´ par leurs pertinentes contributions. Le chapitre sur le travail cooperatif´ a ben´ efici´ e´ de l’aide de Yan PUJANTE, auteur d’un me-´ moire de recherche sur le sujet. Nous tenons egalement´ a` remercier Bruno BEAUGRAND, Raphael¨ LUTA et Philippe MEU- NIER qui ont eu la gentillesse de nous procurer les documentations techniques dont nous avions besoin.
    [Show full text]
  • The Long Road to 64 Bits
    DOI:10.1145/1435417.1435431 Double, double toil and trouble —Shakespeare, Macbeth, Act 4, Scene 1 BY JOHN MASHEY The Long Road To 64 Bits SHAKESpeare’S WORDS OFTEN cover circumstances beyond his wildest dreams. Toil and trouble accompany major computing transitions, even when people plan ahead. Much of tomorrow’s software will still be driven by decades-old decisions. Past decisions have unanticipated side effects that last decades and can be difficult to undo. ranging from high-level strategies down For example, consider the overly to programming specifics. long, often awkward, and sometimes contentious process by which 32-bit Fundamental Problem (late 1980s) microprocessor systems evolved into Running out of address space is a long 64/32-bitters needed to address larger tradition in computing, and often quite storage and run mixtures of 32- and 64- predictable. Moore’s Law grew DRAM bit user programs. Most major general- approximately four times bigger every purpose CPUs now have such versions, three to four years, and by the mid- so bits have “doubled,” but “toil and 1990s, people were able to afford 2GB trouble” are not over, especially in soft- to 4GB of memory for midrange micro- ware. processor systems, at which point sim- This example illustrates the interac- ple 32-bit addressing (4GB) would get tions of hardware, languages (especial- awkward. Ideally, 64/32-bit CPUs would ly C), operating system, applications, have started shipping early enough standards, installed-base inertia, and (1992) to have made up the majority of industry politics. We can draw lessons the relevant installed base before they Chronology: Multiple E K Interlocking RANS IBM S/360 F EN 32-bit, with 24-bit B Threads addressing (16MB total) BY H P of real (core) memory HOTOGRA P 1964 1965 JANUary 2009 | VOL.
    [Show full text]
  • Validated Products List: Programming Languages, Database Language
    NISTIR 469 (Supersedes NISTIR 4623) VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Language SQL Graphics ®OSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director — QC 100 .U56 NIST //4690 1991 V C.2 NISTIR 4690 (Supersedes NISTIR 4623) - ' J JF VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Langucige SQL Graphics GOSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director FOREWORD The Validated Products List (formerly called the Validated Processor List) is a collection of registers describing implementations of Federal Information Processing Standards (FIPS) that have been tested for conformance to FIPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. TABLE OF CONTENTS 1. INTRODUCTION 1-1 1.1 Purpose 1-1 1.2 Document Organization 1-1 1.2.1 Programming Languages 1-1 1.2.2 Database Language SQL 1-2 1.2.3 Graphics 1-2 1.2.4 GOSIP 1-2 1.2.5 POSIX 1-2 1.2.6 FIPS Conformance Testing Products 1-2 2.
    [Show full text]
  • Amdahl 580 Series
    70C-Q.Ht.tM-'l" Computers Amdahl 580 Series MANAGEMENT SUMMARY Amdahl Corporation's 5890 Series is posi­ UPDATE: As a manufacturer of IBM plug-compatible tioned as a price/performance alternative to products, Amdahl has scaled profitable peaks andfallen into the IBM 3090 Series. The older Amdahl 580 some less than profitable valleys. At the moment, Amdahl is models are now in "limited new produc­ perched on another peak. The volume shipment ofAmdahl tion," according to Amdahl. 5890-300 mainframes, which compete against the IBM 3090, in addition to the sale ofdouble-capacity 6380E disks MODELS: 5840, 5850, 5860, 5867, 5868, made 1986 a financially satisfying year for Amdahl, to say 5870, 5880, and 5890-190E, -200E, the least. After coming off a very profitable 1986, Amdahl -300E, -400E, and -600E. responded to IBM's January 3090 liE" model announce­ CONFIGURATION: One, two, three, or four ments with the February introduction of a new three-way CPUs, up to 512MB of main memory, and up 5890-400E processor and the announcement ofperformance to 128 I/O channels. enhancements to existing 5890 models. Similar to IBM, COMPETITION: IBM 4381, IBM 308X, Amdahl also appended an liE" to the end ofeach ofits new IBM 3090, NAS AS/XL Series. and existing 5890 IBM-compatible machines. In January, PRICE: Prices range from $1,270,000 to Amdahl also announced a new 5890-190 uniprocessor $12,220,000. which has since been upgraded to a 5890.. ']90E. The new Amdahl 5890-190E, the first single-processor offering in the model line, establishes a new 5890 entry point for Amdahl CHARACTERISTICS 580 users contemplating a move to Amdahfs latest main­ frame generation.
    [Show full text]
  • Multithreading the Sunos Kernel
    BeyondMultiprocessing: Multithreadingthe SUnOSKernel t. 4. Fyt4olg S, R. Kleimaq S. Børton,R. Faulkner,A. Shivalingiah, M. Smith,D. Stein,J. Voll, M. Weeks,D. Williams- SunSoft,[nc. ABSTRACT Preparingthe SUnOSiSVR4kernel for today'schallenges: symmetric multiprocessing, multi-th¡eadedapplications, real-time, and multimedia,led to the incorporationof several innovativetechniques. In particular,the kernelwas re-structuredaround threads. Threads are usedfor most asynchronousprocessing, including interrupts. The resultingkernel is fully preemptibleand capableof real-timeresponse. The combinationprovides a robustbase for highly concurrent,responsive operation. Introduction having only a small data structure and a stack. Switchingbetween When we started to investigateenhancements kernelthreads does not requirea changeof virtual memory to the SunOSkernel to supportmultiprocessors, we addressspace information, so it is relatively realized that we wanted to go further than merely inexpensive.Kernel threadsare fully preemptible addinglocks to the kernel and keepingthe userpro- and may be scheduledby any of the scheduling cessmodel unchanged.It was importantfor the ker- classesin the system,including the real-time(fixed priority) nel to be capableof a high degreeof concurrencyon class. Sinceall other exe- cution entities tightly coupled symmetricmultiprocessors, but it are built using kernel th¡eads,they representa fully preemptible, was also a goal to supportmore thanone threadof real-time"nucleus" within the kernel. controlwithin a userprocess. These threads must be capableof executingsystem calls and handlingpage Kernel th¡eads use synchronizationprimitives faults independently. On multiprocessorsystems, that supportprotocols for preventingpriority inver- theseth¡eads of control must be capableof running sion, so a thread'spriority is determinedby which concurently on different processors.[Powell 1991] activitiesit is impedingby holdinglocks as well as describedthe user-visiblethread architecture.
    [Show full text]
  • Unix System Services
    Betriebssysteme it-Akademie Bayern z/OS und OS/390 Lehrgang 2009 Prof. Dr.-Ing. Wilhelm G. Spruth Teil 12 z/OS Unix System Services bs 1001 ww6 © copyright W. G. Spruth, 10-2000 wgs 03-95 Unix Welche Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series OS/400 • zSeries Betriebssysteme – z/OS, zVM, zVSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix • MacOS (BSD) • Linux, einschließlich zLinux • z/OS Unix System Services Literatur OS/390 Unix System Services. IBM Form No. SC28- 1891-8 Jürgen Gulbins: “Unix”. Springer Verlag , 3. Auflage, 1988. ISBN 3-540-19248-4 Gutes Handbuch, um mit den einzelnen Unix Shell befehlen zu arbeiten. History of Unix Operating Systems z/OS vs. Unix OS/390 mehrere 1000 E/A Operationen / s Unix mehrere 100 E/A Operationen / s Native Unix Betriebssysteme für S/390 Amdahl UTS (Universal Time Sharing System) Marktführer, < 300 Installationen Hitachi HI-OSF/1-M IBM AIX/ESA (nicht mehr verfügbar) z/OS Unix System Services früher als Open Edition MVS (OMVS) bezeichnet 1100 Unix API´s es 0519z ww6 wgs 09-99 The work on Portable Operating Systems Interface (Posix) started out as an effort to standardize UNIX and was performed by a work group under IEEE (Institute of Electrical and Electronic Engineers). What they defined was an application programming interface which could be applied not only to UNIX systems but to other operating systems, like OS/390. Posix is now a set of standards that define common interfaces across operating systems.
    [Show full text]
  • AUUGN Volume 11, Number 3 June 1990
    AUUGN Volume 11, Number 3 June 1990 The Australian UNIX* systems User Group Newsletter Volume 11 Number 3 June 1990 CONTENTS AUUG General Information .......................... 3 Editorial ................................ 4 AUUG Institutional Members ........................ 6 Letters tothe Editor ................. ACSnet Survey .......................... 10 SESSPOOLE Information ...................... 13 Call For Papers: AFUU Convention UNIX ’91 .............. 14 AUUG Book Club - Reviews & Order Form ............... 17 Perth Summer’90 Technical Meeting Report ................ 23 Using UNIX as a Persistent Programming Environment (From Summer’90 Victoria) . 25 UNIX System V Release 4 and OSF/1 (From Summer’90 Sydney) ....... 30 Optimizing The B5FS File System .................... 38 Open Buzzwords And NPA’s .................. 46 Bulgeria In Turmoil ......................... 48 USENIX Association News For AUUG Members ............. 5O AUUGN Back Issues ........................ 54 WAUG Information ................. ¯ . 55 AUUG Membership Information .................. 56 AUUG Forms .......................... 57 AUUGN 1 Vol 11 No 3 Copyright © 1990 AUUG Incorporated. All rights reserved. AUUGN is the journal of the Australian UNIX1 systems User Group (AUUG Incorporated). Copying without fee is permitted provided that copies are made without modification, and are not made or distributed for commercial advantage. Credit to AUUGN and the author must be given. Abstracting with credit is permitted. No other reproduction is permitted without prior consent of AUUG Incorporated. 1 UNIX is a registered trademark of AT&T in the USA and other countries. Vol 11 No 3 2 AUUGN AUUG General Information Memberships and Subscriptions Membership, Change of Address, and Subscription forms can be found at the end of this issue. All correspondence concerning membership of the AUUG should be addressed to:- The AUUG Membership Secretary P.O. Box 366 Phone: (02) 361 5994 Kensington, N.S.W.
    [Show full text]