Solved

Windows Task Manager User tab

Posted on 2008-06-12
8
837 Views
Last Modified: 2013-12-04
Checked the user tab on task manager and see microsoft in the "User" column and disconnected in the "Status" column. Anyone know what's going on?
0
Comment
Question by:lunamoonfaze
  • 4
  • 2
  • 2
8 Comments
 
LVL 13

Expert Comment

by:ScooterAnderson
Comment Utility
That tab shows you who is connected to the server via RDP/Terminal Services.  Or in your case: who _was_ connected and has a Terminal Services session in a "Disconnected" state.  Try and right-click on it to see if you can Remote Control the session and see what was going on.
0
 

Author Comment

by:lunamoonfaze
Comment Utility
Dropped in and found nothing good. Files found on desktop: dm.exe, ku.mmp, firefox setup 2.0.0.14.exe, smtp.csv and last but certainly not least: gammadyne mailer.
0
 
LVL 13

Expert Comment

by:ScooterAnderson
Comment Utility
Hmmm... Just guessing - you don't have a user in your domain or on the server that's named "Microsoft", do you?  You may want to review user accounts and security on your server - it may have been hacked.  Don't know if you have a structured server security compromise gameplan, but I would consider the server compromised and get it off the network as quickly as possible and start assessing the rest of your network to make sure they haven't done anything to the rest of your servers/clients.  It's most likely they were just interested in getting/building a spambox for their purposes, but you never know...  Good Luck with this...

dm.exe    - Take a google on this, it's a known backdoor trojan
gammadyne mailer - possible whomever it was was trying to drop a mailer program on your server to make it a spam box.
0
 
LVL 32

Accepted Solution

by:
r-k earned 125 total points
Comment Utility
Looks like server was hacked. Here is my checklist for times like these:

(1) Examine all user accounts, disable or delete any accounts known to be fraudulent, then change passwords on all admin accounts, using at least 10 chars and avoid common names and words.

(2) Enable lockout policy on failed logins (so that an account is locked out for 10 mins. after e.g. 6 failed attempts). Note: The Administrator account cannot be locked out so make sure that has a tough and long password.

(3) Download RootkitRevealer (http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx) and do a scan. Post the log here if it shows anything suspect. If the log is very long then just post the first 30 lines or so. Be sure to save the log in any case.

(4) Download Autoruns from: http://www.microsoft.com/technet/sysinternals/utilities/Autoruns.mspx
(a) Run the program. It lists a bunch of things that start when Windows starts.
(b) From the menu bar, select Options, and uncheck "Include Empty Locations" and "check" "Hide Microsoft Entries"
    Important -> Then click the Refresh button in the toolbar.
(c) This will give you a shorter, more meaningful list.
(d) Post the log here if anything interesting.

(5) Run "netstat -ab" from a command prompt, save the output to a text file (e.g. "netstat -ab > list.txt") then examine for anything that doesn't belong. If you like you can post the suspect entries here. Replace your ip with xx.xx if needed.

(6) If you identify any files installed by the hacker, search the rest of your C: drive for any other files created/modified around that date and time. Also, rather than deleting files left behind by the hackers, move them to another disk or CD for possible later study.

(7) After things have been cleaned up, download and run MBSA from: http://www.microsoft.com/technet/security/tools/mbsahome.mspx and do a scan and follow as many steps as reasonable.

(8) Turn off unnecessary network services.

(9) If you have a firewall, check which ports are open, and why.
0
Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

 

Author Comment

by:lunamoonfaze
Comment Utility
This a file server that is in use during regular business hours. My local LAN specialist is scheduled to come out next weekend. I will follow your checklist then. Thanks for the details.
0
 

Author Comment

by:lunamoonfaze
Comment Utility
RootkitRevealer log:

HKLM\SECURITY\Policy\Secrets\gthrsvc:{505DD11A-F6DE-4559-8EA2-7B27A5457A08}*      11/2/2006 2:07 PM      0 bytes      Key name contains embedded nulls (*)
HKLM\SECURITY\Policy\Secrets\SAC*      10/31/2006 4:00 PM      0 bytes      Key name contains embedded nulls (*)
HKLM\SECURITY\Policy\Secrets\SAI*      10/31/2006 4:00 PM      0 bytes      Key name contains embedded nulls (*)
HKLM\SECURITY\Policy\Secrets\SCM:{148f1a14-53f3-4074-a573-e1ccd344e1d0}*      10/31/2006 3:21 PM      0 bytes      Key name contains embedded nulls (*)
HKLM\SECURITY\Policy\Secrets\SCM:{3D14228D-FBE1-11D0-995D-00C04FD919C1}*      11/2/2006 1:55 PM      0 bytes      Key name contains embedded nulls (*)
HKLM\SOFTWARE\Classes\ActEmailFile\      6/5/2007 5:13 PM      19 bytes      Data mismatch between Windows API and raw hive data.
HKLM\SOFTWARE\Classes\ActEmailFile\DefaultIcon\      6/5/2007 5:13 PM      39 bytes      Data mismatch between Windows API and raw hive data.
HKLM\SOFTWARE\Classes\ActEmailFile\shell\open\      6/5/2007 5:13 PM      21 bytes      Data mismatch between Windows API and raw hive data.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveUptime      6/28/2008 1:07 PM      4 bytes      Data mismatch between Windows API and raw hive data.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveStamp      6/28/2008 1:07 PM      16 bytes      Data mismatch between Windows API and raw hive data.
C:\Program Files\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_9ef0d2ac01c8d9520000000d.EML      6/28/2008 1:10 PM      4.39 KB      Hidden from Windows API.
C:\Program Files\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_9ef0d2ac01c8d9520000000d.EML:PROPERTIES      6/28/2008 1:10 PM      2.02 KB      Hidden from Windows API.
C:\Program Files\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_9ef0d2ac01c8d9520000000d.EML:PROPERTIES-LIVE      6/28/2008 1:10 PM      6.02 KB      Hidden from Windows API.

rootkitrevealer-log.txt
0
 
LVL 32

Expert Comment

by:r-k
Comment Utility
You definitely don't have a rootkit. Anything interesting shown by Autoruns?
0
 

Author Closing Comment

by:lunamoonfaze
Comment Utility
Thanks again. Your suggestions were exactly what I was looking for to know.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Join & Write a Comment

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now