B
Bryan Martin
Windows 2k Advanced server SP4 with updates current.
SQL Service SP1 8.00.760
IIS5 with all updates applied. NOT running FTP
DNS/DHCP/WINS
Newly commissioned (about 2 weeks) windows box that sits ahead of DMZ behind
a time warner cable modem. No user interaction whats so ever. Box simply
serves DHCP/WINS/DNS and a website. No users logs onto this box and the box
has not been logged into within the last week. On 1/27/04 network slowed
with traffic pointing to this box. You can see by the screenshot within a
terminal service connection
(http://www.myplaceinspace.com/virus/VirusScreenshot.gif) that outbound was
pegged (for a cable modem) at 309.8kbps. Only connections into the box were
the *.dip.t-dialin.net connections. These connections are running under
sqlsrv32.exe with the virus actually masking itself as the "msiexec16.exe"
file you see later down the list on port 60090. You can see what files I
could find that were new on the system
(http://http://www.myplaceinspace.com/virus/) starting at the winnt
directory and files into the system32 directory also. As do most viruses a
reg keys were entered
HKLM->SOFTWARE->->Microsoft->Windows->CurrentVersion->Run to automatically
run the msiexec16.exe file and also a key was entered at
HKLM->SOFTWARE->->Microsoft->Windows->CurrentVersion->RunServices to do the
same. IIS log files were checked with no mention of this file being
uploaded. I attempted to trap communications from that program but when I
did the msiexec16.exe switched ports to 60089. Any ideas?
Bryan Martin
A&H Wayside
336-342-0717 ext.18
SQL Service SP1 8.00.760
IIS5 with all updates applied. NOT running FTP
DNS/DHCP/WINS
Newly commissioned (about 2 weeks) windows box that sits ahead of DMZ behind
a time warner cable modem. No user interaction whats so ever. Box simply
serves DHCP/WINS/DNS and a website. No users logs onto this box and the box
has not been logged into within the last week. On 1/27/04 network slowed
with traffic pointing to this box. You can see by the screenshot within a
terminal service connection
(http://www.myplaceinspace.com/virus/VirusScreenshot.gif) that outbound was
pegged (for a cable modem) at 309.8kbps. Only connections into the box were
the *.dip.t-dialin.net connections. These connections are running under
sqlsrv32.exe with the virus actually masking itself as the "msiexec16.exe"
file you see later down the list on port 60090. You can see what files I
could find that were new on the system
(http://http://www.myplaceinspace.com/virus/) starting at the winnt
directory and files into the system32 directory also. As do most viruses a
reg keys were entered
HKLM->SOFTWARE->->Microsoft->Windows->CurrentVersion->Run to automatically
run the msiexec16.exe file and also a key was entered at
HKLM->SOFTWARE->->Microsoft->Windows->CurrentVersion->RunServices to do the
same. IIS log files were checked with no mention of this file being
uploaded. I attempted to trap communications from that program but when I
did the msiexec16.exe switched ports to 60089. Any ideas?
Bryan Martin
A&H Wayside
336-342-0717 ext.18