Security Incidents mailing list archives
Re: Compromised Windows Server
From: Harlan Carvey <keydet89 () yahoo com>
Date: Tue, 6 Jun 2006 04:32:15 -0700 (PDT)
Patrick,
Came in this morning to find a windows 2003 server I manage scanning the Internet for machines listening on tcp 139 and 445. While looking at the machine I noticed the following processes running. Mwvsta.exe found in c:\windows\system32 rundll16.exe c:\windows\system23 Ponoas.exe c:\windows\system32 I believe that the ponoas.exe is some sort of rootkit
although searching on google for this file name returns nothing. Also searching mwvsta.exe returns nothing.
I'm not surprised...files can be named anything.
At this point I have removed these files from the system and registry
Where were the references located in the Registry? Which key(s)? Did you happen to get the LastWrite times from those keys?
but am weary that the server will get hit again. Has anyone had an experience with the following file or have any idea what rookkit of virus they are associated with?
Well, to be honest, so far there's nothing to indicate that there is a virus or a rootkit at work here. This may end up being the case, but so far all there is is speculation, with no hard evidence. Did you happen to do any other triage or evidence collection prior to getting rid of the files? Do you have the files still? More importantly, can you tell us why you think one of the files is a rootkit? Thanks, Harlan ------------------------------------------ Harlan Carvey, CISSP "Windows Forensics and Incident Recovery" http://www.windows-ir.com http://windowsir.blogspot.com ------------------------------------------ ------------------------------------------------------------------------------ This List Sponsored by: Black Hat Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas. World renowned security experts reveal tomorrow.s threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations. http://www.blackhat.com ------------------------------------------------------------------------------
Current thread:
- Compromised Windows Server Patrick Beam (Jun 05)
- Re: Compromised Windows Server Jamie Riden (Jun 05)
- Re: Compromised Windows Server pauls (Jun 05)
- Re: Compromised Windows Server Jason Ross (Jun 05)
- Re: Compromised Windows Server Axel Pettinger (Jun 06)
- Re: Compromised Windows Server Harlan Carvey (Jun 06)
- Re: Compromised Windows Server Patrick Beam (Jun 06)
- Re: Compromised Windows Server Kees Leune (Jun 07)
- Re: Compromised Windows Server Isaac Perez (Jun 06)
- Re: Compromised Windows Server Macleonard Starkey (Jun 06)
- <Possible follow-ups>
- Re: Re: Compromised Windows Server wnorth (Jun 05)
- Re: Compromised Windows Server Butterworth, Jim (Jun 06)
- Re: Compromised Windows Server ross (Jun 06)
- RE: Compromised Windows Server Alan Davies (Jun 08)
- Re: Compromised Windows Server df (Jun 08)