Solved

how to track the source of audit failures?

Posted on 2014-09-14
13
328 Views
Last Modified: 2014-12-19
Our domain controller is windows 2008 R2.  Lately, I've been noticing many audit failures under the security logs and corresponding directory service errors (error 12294) under the system logs.  The system error states that the administrator account cannot be locked out.  I've copied the audit failure result below:

How can I track down the source of the failed attempts?

An account failed to log on.

Subject:
      Security ID:            SYSTEM
      Account Name:            our domain controller$
      Account Domain:            our domain
      Logon ID:            0x3e7

Logon Type:                  3

Account For Which Logon Failed:
      Security ID:            NULL SID
      Account Name:            Administrator
      Account Domain:            our domain

Failure Information:
      Failure Reason:            Unknown user name or bad password.
      Status:                  0xc000006d
      Sub Status:            0xc000006a

Process Information:
      Caller Process ID:      0x230
      Caller Process Name:      C:\Windows\System32\lsass.exe

Network Information:
      Workstation Name:      our domain controller
      Source Network Address:      address of our sonicwall
      Source Port:            1559

Detailed Authentication Information:
      Logon Process:            Advapi  
      Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
      Transited Services:      -
      Package Name (NTLM only):      -
      Key Length:            0

Under details, I get:

- System

  - Provider

   [ Name]  Microsoft-Windows-Security-Auditing
   [ Guid]  {54849625-5478-4994-A5BA-3E3B0328C30D}
 
   EventID 4625
 
   Version 0
 
   Level 0
 
   Task 12544
 
   Opcode 0
 
   Keywords 0x8010000000000000
 
  - TimeCreated

   [ SystemTime]  2014-09-15T00:48:06.692639500Z
 
   EventRecordID 112677147
 
   Correlation
 
  - Execution

   [ ProcessID]  560
   [ ThreadID]  3592
 
   Channel Security
 
   Computer our domain controller
 
   Security
 

- EventData

  SubjectUserSid S-1-5-18
  SubjectUserName our domain controller$
  SubjectDomainName our domain
  SubjectLogonId 0x3e7
  TargetUserSid S-1-0-0
  TargetUserName Administrator
  TargetDomainName our domain
  Status 0xc000006d
  FailureReason %%2313
  SubStatus 0xc000006a
  LogonType 3
  LogonProcessName Advapi  
  AuthenticationPackageName MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  WorkstationName our domain controller
  TransmittedServices -
  LmPackageName -
  KeyLength 0
  ProcessId 0x230
  ProcessName C:\Windows\System32\lsass.exe
  IpAddress the address of our sonicwall
  IpPort 1559
0
Comment
Question by:akyuen
  • 8
  • 5
13 Comments
 
LVL 12

Accepted Solution

by:
trinitrotoluene earned 500 total points
Comment Utility
LogonType 3 shows that the login happened from your network.

You also have the event ID and EventRecordID. Can you try checking the event log for entries created around the same time?

The event log doesn't log every audit event though.
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
ensure that all shares on this particular machine are disabled till you sort out this issue
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
Network Information:
      Workstation Name:      our domain controller
      Source Network Address:      address of our sonicwall
      Source Port:            1559


The network info should give info about where the login attempt originated from
0
 

Author Comment

by:akyuen
Comment Utility
The network information shows that the workstation name is my domain controller and that the source network address originates from my sonicwall.  Does that mean that there's a network connection trying to log on directly into my domain controller?
0
 

Author Comment

by:akyuen
Comment Utility
there are no shared drives or folders on the domain controller.
0
 

Author Comment

by:akyuen
Comment Utility
What I'm confused about is whether this is an attempt to log into the domain controller or is something trying to access a shared file or folder on another server (perhaps my file server), which is AD integrated.
0
Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
have you tried my first comment : check and correlate with the event log for events happening around the same time

The attempt has definitely originated at the workstation identified by the "workstation" under Network Information. An event id of 4625 could  also mean a failed attempt to just access a shared file/folder
0
 

Author Comment

by:akyuen
Comment Utility
There's nothing in the event log on the domain controller that correspond to the frequency or duration of these errors.
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
The source of these errors could be anything, the below is what I'm familiar with

1)ftp login failures. Check your ftp log
2)login via basic authentication over http/https....potentially dangerous if its unauthorised
3)ASP scripts
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
Check the frequency and timing of these login failure logs. That might also give you a clue as to the source
0
 

Author Comment

by:akyuen
Comment Utility
I get an audit failure every 7 seconds...
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
so its probably an automated task/cron job that's running periodically on the DC
0
 
LVL 12

Expert Comment

by:trinitrotoluene
Comment Utility
i would also recommend looking at the Application log for entries occurring at about the same time
0

Featured Post

Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

Join & Write a Comment

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now