At work, I recently set up a server that I am using to develop a new department website. This particular machine is Linux based and as part of the process, I installed Snort to monitor the traffic. This machine is dual homed with a NIC assigned a public IP and one with a private IP. I am using IPtables to block most forms of traffic from the public facing IP address including SMB (ports 445 and 139), which are only allowed on the private LAN.
Every day at about 3:40am, this machine gets "scanned" by another machine. The scanning comes from multiple vectors. It comes via SMB requests on the public IP address on both ports 445 and 139 and it comes in via WebDAV using the PROPFIND method. The firewall logs are showing the SMB traffic as being blocked, but at one point when I did not have the firewall up, Snort alerted that it was asking for C:/ drive access. According to a packet analysis on the WebDAV traffic, the user agent appears as webDAV miniredir and it is looking for any form of executable on the C:/ location. Unfortunately the webDAV traffic arriving via a proxy server so I don't have immediate confirmation as to whether or not it is the same machine, but based on the fact that the origin times are consistent and a few seconds apart I strongly suspect that it is.
Using the IPTables logs, we have identified which machine is the culprit and it is one of the machines in our department. Our IT department has checked this machine for malware (I don't know what tool were used) and found none. They have also removed at least most of their administrative applications that could wake the computer and might perform such a scan. They claim that there are no processes scheduled to run at this time and can find no cause for the 3:40am actions. At this stage, they would like to wipe and re-image the machine.
While I agree that a wipe may be in order, I prefer to perform an investigation into the root cause of problem. The timing is quite consistent each day, occurring a few minutes either side of 3:40am for both types of traffic and I think it would be easy to spoof the clock into thinking it is 3:40am and watch the machine with tools to identify the cause.
I am much more fluent in Linux security than Windows and am at somewhat of a loss on specifics for how to analyze a Windows based machine. I have suggested reviewing the CERT checklist and suggested either running a check with Hijackthis or combofix to get information on the machine.
I would like to ask, what would be your recommendations of things to do to best analyze this machine so that I can more effectively make a case for investigation rather than a simple wipe and re-install.
Every day at about 3:40am, this machine gets "scanned" by another machine. The scanning comes from multiple vectors. It comes via SMB requests on the public IP address on both ports 445 and 139 and it comes in via WebDAV using the PROPFIND method. The firewall logs are showing the SMB traffic as being blocked, but at one point when I did not have the firewall up, Snort alerted that it was asking for C:/ drive access. According to a packet analysis on the WebDAV traffic, the user agent appears as webDAV miniredir and it is looking for any form of executable on the C:/ location. Unfortunately the webDAV traffic arriving via a proxy server so I don't have immediate confirmation as to whether or not it is the same machine, but based on the fact that the origin times are consistent and a few seconds apart I strongly suspect that it is.
Using the IPTables logs, we have identified which machine is the culprit and it is one of the machines in our department. Our IT department has checked this machine for malware (I don't know what tool
While I agree that a wipe may be in order, I prefer to perform an investigation into the root cause of problem. The timing is quite consistent each day, occurring a few minutes either side of 3:40am for both types of traffic and I think it would be easy to spoof the clock into thinking it is 3:40am and watch the machine with tools to identify the cause.
I am much more fluent in Linux security than Windows and am at somewhat of a loss on specifics for how to analyze a Windows based machine. I have suggested reviewing the CERT checklist and suggested either running a check with Hijackthis or combofix to get information on the machine.
I would like to ask, what would be your recommendations of things to do to best analyze this machine so that I can more effectively make a case for investigation rather than a simple wipe and re-install.