Security Incidents mailing list archives

Re: Compromised Windows Server


From: Harlan Carvey <keydet89 () yahoo com>
Date: Tue, 6 Jun 2006 04:32:15 -0700 (PDT)

Patrick,

Came in this morning to find a windows 2003 server I
manage scanning the
Internet for machines listening on tcp 139 and 445. 
While looking at the
machine I noticed the following processes running.

Mwvsta.exe found in c:\windows\system32
rundll16.exe c:\windows\system23
Ponoas.exe  c:\windows\system32

I believe that the ponoas.exe is some sort of
rootkit 

although searching on
google for this file name returns nothing.  Also
searching mwvsta.exe returns nothing.  

I'm not surprised...files can be named anything.

At this point I have removed these files
from the system and registry 

Where were the references located in the Registry? 
Which key(s)?  Did you happen to get the LastWrite
times from those keys?

but am weary that the server will get
hit again.  Has anyone
had an experience with the following file or have
any idea what rookkit of
virus they are associated with?

Well, to be honest, so far there's nothing to indicate
that there is a virus or a rootkit at work here.  This
may end up being the case, but so far all there is is
speculation, with no hard evidence.

Did you happen to do any other triage or evidence
collection prior to getting rid of the files?  Do you
have the files still?

More importantly, can you tell us why you think one of
the files is a rootkit?  

Thanks,

Harlan

------------------------------------------
Harlan Carvey, CISSP
"Windows Forensics and Incident Recovery"
http://www.windows-ir.com
http://windowsir.blogspot.com
------------------------------------------

------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas. 
World renowned security experts reveal tomorrow.s threats today. Free of 
vendor pitches, the Briefings are designed to be pragmatic regardless of your 
security environment. Featuring 36 hands-on training courses and 10 conference 
tracks, networking opportunities with over 2,500 delegates from 40+ nations. 

http://www.blackhat.com
------------------------------------------------------------------------------


Current thread: