G
Guest
I have a W2K DC which is showing unusual LSASS cpu activity. I had previously
posted this request to the w2k.network group and it was suggested that the DC
in question likely was infected by a worm. I do not believe this to be true
for the following reasons.
-the unusual activity was first spotted on another DC and moved to this DC
after that first DC was rebooted (I rebooted the first DC to see if a reboot
would clear the unusual activity, I noted the activity moved to this DC
before the first had even finished coming back up).
-the unusual activity has not has not appeared on other DCs even though 6
other DCs sit in the same network subnet.
-no unusual network related activity is seen on the effected DC during each
event (in either direction, that includes increase in activity or sequential
port scanning activities).
-the activity appears more like a network re-try than a scan activity, that
is LSASS activity peaks the CPU at 98% for about 10sec (it was less on the
first DC because that DC has faster/mulitple cpus) then idles, repeating in
about 60sec intervals.
-all DCs in site are patched the same, that is within 48hours of any
security patch release (we wait 24hours just to see if the patch will be
changed or recalled).
-DCs are not used interactively (no mail, no web, nothing).
-there are other member servers in the same subnet with active firewalls and
yet no firewall or AV software on those machines have detected worm activity.
-I have disconnected the DC in question (not a reboot, a disconnect, process
stayed in memory) and the activity stopped for about 16hours.
-I have rebooted the DC in question and again the activity stopped over night.
This, could be caused by a worm infected client, but if so, then why don't
any other DCs show this activity. And why wouldn't any of the firewalled
member or standalone servers in the same subnet show netbios access attempts.
I think it's caused by a mis-configured piece of software attempting to
access LSASS inapproprately.
I have a sniffer capturing packets sent to this machine, however, since this
DC also provides DNS and WINS functionality besides being a DC, it's hard to
find anything useful in the captures. The DC as you expect talks to a lot of
machines a lot of ways.
So, what I was wondering is if anyone can tell me what to filter my sniffer
captures on to find out the start of transaction packet for any machine
attempting to hit the LSASS service. If I can find that, I can make a list
of machines which appear to be starting transactions every 60 secs against
that host.
posted this request to the w2k.network group and it was suggested that the DC
in question likely was infected by a worm. I do not believe this to be true
for the following reasons.
-the unusual activity was first spotted on another DC and moved to this DC
after that first DC was rebooted (I rebooted the first DC to see if a reboot
would clear the unusual activity, I noted the activity moved to this DC
before the first had even finished coming back up).
-the unusual activity has not has not appeared on other DCs even though 6
other DCs sit in the same network subnet.
-no unusual network related activity is seen on the effected DC during each
event (in either direction, that includes increase in activity or sequential
port scanning activities).
-the activity appears more like a network re-try than a scan activity, that
is LSASS activity peaks the CPU at 98% for about 10sec (it was less on the
first DC because that DC has faster/mulitple cpus) then idles, repeating in
about 60sec intervals.
-all DCs in site are patched the same, that is within 48hours of any
security patch release (we wait 24hours just to see if the patch will be
changed or recalled).
-DCs are not used interactively (no mail, no web, nothing).
-there are other member servers in the same subnet with active firewalls and
yet no firewall or AV software on those machines have detected worm activity.
-I have disconnected the DC in question (not a reboot, a disconnect, process
stayed in memory) and the activity stopped for about 16hours.
-I have rebooted the DC in question and again the activity stopped over night.
This, could be caused by a worm infected client, but if so, then why don't
any other DCs show this activity. And why wouldn't any of the firewalled
member or standalone servers in the same subnet show netbios access attempts.
I think it's caused by a mis-configured piece of software attempting to
access LSASS inapproprately.
I have a sniffer capturing packets sent to this machine, however, since this
DC also provides DNS and WINS functionality besides being a DC, it's hard to
find anything useful in the captures. The DC as you expect talks to a lot of
machines a lot of ways.
So, what I was wondering is if anyone can tell me what to filter my sniffer
captures on to find out the start of transaction packet for any machine
attempting to hit the LSASS service. If I can find that, I can make a list
of machines which appear to be starting transactions every 60 secs against
that host.