Just a guess, but I'd bet the behavior you're seeing is the same method with 
which you became infected, that is, via TCP 139 and 445.  Sounds like a 
propogation worm.

It will morph on reboot, so use a prog like regshot or regmon to diff the 
registry.

Check HKLM software Microsoft windowsnt currentversion run for any new 
processes set to run at boot.

Use a forensic solution to get the malware back, copy it to a VM box using NAT, 
set the VM's gateway to your local host and sniff the traffic for signs of 
replication mechanism.

After you get the malware off the box, clean registry, and patch the box.

Best,
Jim Butterworth
Guidance Software
Mgr.  Prof Svcs

Jim Butterworth, EnCE, GCIA
Manager, Professional Services, Southwest

*** Sent while Mobile ***




-----Original Message-----
From: Patrick Beam <[EMAIL PROTECTED]>
To: [email protected] <[email protected]>
Sent: Mon Jun 05 12:27:32 2006
Subject: Compromised Windows Server

Came in this morning to find a windows 2003 server I manage scanning the
Internet for machines listening on tcp 139 and 445.  While looking at the
machine I noticed the following processes running.




Mwvsta.exe found in c:\windows\system32

rundll16.exe c:\windows\system23

Ponoas.exe  c:\windows\system32



I believe that the ponoas.exe is some sort of rootkit although searching on
google for this file name returns nothing.  Also searching
mwvsta.exereturns nothing.  At this point I have removed these files
from the system
and registry but am weary that the server will get hit again.  Has anyone
had an experience with the following file or have any idea what rookkit of
virus they are associated with?



Thanks,



Patrick

------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas. 
World renowned security experts reveal tomorrow.s threats today. Free of 
vendor pitches, the Briefings are designed to be pragmatic regardless of your 
security environment. Featuring 36 hands-on training courses and 10 conference 
tracks, networking opportunities with over 2,500 delegates from 40+ nations. 

http://www.blackhat.com
------------------------------------------------------------------------------

Reply via email to