Security Basics mailing list archives
Re: Windows2000 Security event logs
From: Charles Otstot <charles.otstot () ncmail net>
Date: Fri, 17 Sep 2004 08:27:50 -0400
Expanding on Roger's question....Assuming the User Name: field is populated with a user account name, is it a valid, proper account (i.e an account that should exist and should be accessible)? Would that user have any reason to perform any tasks against remote systems (e.g. MBSA)? Could your organization have an application that has embedded credentials somewhere?
Was the access a one-time occurrence or recurring?If recurring, have you asked the account owner to change his/her password. Assuming "Yes", what were the results? If changing the password did not result in failures, have you looked to the account owner to provide an explanation of the activity (and the activity could well be legitimate on his/her part)? Do you have any sort of services (e.g. monitoring services) running under an account name which run against remote systems on a timed basis? Assuming that the number of systems involved is sufficiently large, I would expect some sort of automated access mechanism , such as monitors, to be the source mechanism. Have you ruled out non-nefarious activity as the source? Oftentimes Windows Security Log logon events get mislabeled as malicious activity, when in fact, the noted behavior is the result of normal activity. If not, what normal activities have you investigated that might result in this behavior?
While I wouldn't rule out something malicious, unless you've eliminated non-malicious sources, the only thing really suspicious about the log entries as cited and described is the notation that they were observed on multiple computers in a short timespan. Even that is easily explainable, depending upon your organization's circumstances. In this case, it might be useful to consider (and eliminate) legitimate sources before looking too deeply for malicious sources.
Charlie Roger A. Grimes wrote:
Was the User Name: field really populated with the datum username or iswas it a really user account name?-----Original Message-----From: Dave Gonsalves [mailto:davegon () gmail com] Sent: Monday, September 13, 2004 1:29 PMTo: security-basics () securityfocus com Subject: Windows2000 Security event logs Hi All, Has anyone seen this type of Windows Security Event Log activity before? This was found on multiple computers.... All within a 2 minute time frame...same username and domain. EVENT ID: 576 Special privileges assigned to new logon: User Name: usernameDomain: Logon ID: (0x0,0x5F893A8) Assigned: SeChangeNotifyPrivilegeEVENT ID: 540 Successful Network Logon: User Name: username Domain: DOMAIN Logon ID: (0x0,0x5F893A8) Logon Type: 3 Logon Process: Kerberos Authentication Package: KerberosWorkstation Name:EVENT ID: 538 User Logoff: User Name: username Domain: DOMAIN Logon ID: (0x0,0x5F893A8) Logon Type: 3 One of the computers provided a source IP address so I have checked the computer of the user in question for root kits, trojans, ect. It is fully patched and has AV up to date thanks, Dave ------------------------------------------------------------------------ --- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Windows2000 Security event logs Dave Gonsalves (Sep 15)
- Re: Windows2000 Security event logs Times Enemy (Sep 16)
- <Possible follow-ups>
- RE: Windows2000 Security event logs Roger A. Grimes (Sep 16)
- Re: Windows2000 Security event logs Charles Otstot (Sep 17)
- Re: Windows2000 Security event logs Robert McIntyre (Sep 18)